Analysis

  • max time kernel
    144s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 00:24

General

  • Target

    Undertale/mus_waterquiet.ogg

  • Size

    237KB

  • MD5

    e62ba6eba4d5351d526c9b10ccc595dc

  • SHA1

    a2b49fdf1ce15f75809a58e5514584e0a9c6aade

  • SHA256

    38c9bcb1338b4bead4b60489e41d75ccb60f222f804ffc4218d7e12a53cb3c94

  • SHA512

    71525e980dada0a29c041aa7a7c8e682a71b440fbd4d3e2efdf8ba8f6458c9262bb681a6ecc3ae91eac9f5e753f50e40c9b0b9d7d057100ad5a828701c441172

  • SSDEEP

    6144:a+ndlkYEnGpqZdNzL6GoWRH0u5XVL4dI+/8lnzE0gXi0yK:a6B5u3mG1WKV8I+/8tPEig

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Undertale\mus_waterquiet.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Undertale\mus_waterquiet.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4616
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x304 0x510
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3844-175-0x0000024D60A30000-0x0000024D60C38000-memory.dmp

    Filesize

    2.0MB

  • memory/3844-176-0x0000024D60F20000-0x0000024D60F8B000-memory.dmp

    Filesize

    428KB

  • memory/4616-166-0x00007FFB18B70000-0x00007FFB18B80000-memory.dmp

    Filesize

    64KB

  • memory/4616-139-0x00007FFB08950000-0x00007FFB08984000-memory.dmp

    Filesize

    208KB

  • memory/4616-143-0x00007FFB0F0E0000-0x00007FFB0F0F1000-memory.dmp

    Filesize

    68KB

  • memory/4616-145-0x00007FFB078B0000-0x00007FFB078C1000-memory.dmp

    Filesize

    68KB

  • memory/4616-146-0x00007FFB07890000-0x00007FFB078AD000-memory.dmp

    Filesize

    116KB

  • memory/4616-148-0x00007FFB07670000-0x00007FFB07870000-memory.dmp

    Filesize

    2.0MB

  • memory/4616-147-0x00007FFB07870000-0x00007FFB07881000-memory.dmp

    Filesize

    68KB

  • memory/4616-144-0x00007FFB078D0000-0x00007FFB078E7000-memory.dmp

    Filesize

    92KB

  • memory/4616-138-0x00007FF7360B0000-0x00007FF7361A8000-memory.dmp

    Filesize

    992KB

  • memory/4616-149-0x00007FFB065C0000-0x00007FFB0766B000-memory.dmp

    Filesize

    16.7MB

  • memory/4616-151-0x00007FFB06550000-0x00007FFB06571000-memory.dmp

    Filesize

    132KB

  • memory/4616-160-0x00007FFB063D0000-0x00007FFB06437000-memory.dmp

    Filesize

    412KB

  • memory/4616-158-0x00007FFB06470000-0x00007FFB06488000-memory.dmp

    Filesize

    96KB

  • memory/4616-162-0x00007FFB06340000-0x00007FFB06351000-memory.dmp

    Filesize

    68KB

  • memory/4616-161-0x00007FFB06360000-0x00007FFB063CF000-memory.dmp

    Filesize

    444KB

  • memory/4616-163-0x00007FFB062E0000-0x00007FFB0633C000-memory.dmp

    Filesize

    368KB

  • memory/4616-164-0x00007FFB06160000-0x00007FFB062D8000-memory.dmp

    Filesize

    1.5MB

  • memory/4616-165-0x00007FFB06140000-0x00007FFB06157000-memory.dmp

    Filesize

    92KB

  • memory/4616-141-0x00007FFB0FA40000-0x00007FFB0FA58000-memory.dmp

    Filesize

    96KB

  • memory/4616-142-0x00007FFB0F450000-0x00007FFB0F467000-memory.dmp

    Filesize

    92KB

  • memory/4616-168-0x00007FFB05DA0000-0x00007FFB05DB1000-memory.dmp

    Filesize

    68KB

  • memory/4616-155-0x00007FFB064D0000-0x00007FFB064E1000-memory.dmp

    Filesize

    68KB

  • memory/4616-167-0x00007FFB05DC0000-0x00007FFB05DEF000-memory.dmp

    Filesize

    188KB

  • memory/4616-154-0x00007FFB064F0000-0x00007FFB06501000-memory.dmp

    Filesize

    68KB

  • memory/4616-169-0x00007FFB05D80000-0x00007FFB05D96000-memory.dmp

    Filesize

    88KB

  • memory/4616-156-0x00007FFB064B0000-0x00007FFB064CB000-memory.dmp

    Filesize

    108KB

  • memory/4616-170-0x00007FFB05CB0000-0x00007FFB05D75000-memory.dmp

    Filesize

    788KB

  • memory/4616-172-0x00007FFB05720000-0x00007FFB05731000-memory.dmp

    Filesize

    68KB

  • memory/4616-173-0x00007FFB05700000-0x00007FFB05712000-memory.dmp

    Filesize

    72KB

  • memory/4616-174-0x00007FFB05580000-0x00007FFB056FA000-memory.dmp

    Filesize

    1.5MB

  • memory/4616-171-0x00007FFB05C90000-0x00007FFB05CA5000-memory.dmp

    Filesize

    84KB

  • memory/4616-153-0x00007FFB06510000-0x00007FFB06521000-memory.dmp

    Filesize

    68KB

  • memory/4616-159-0x00007FFB06440000-0x00007FFB06470000-memory.dmp

    Filesize

    192KB

  • memory/4616-152-0x00007FFB06530000-0x00007FFB06548000-memory.dmp

    Filesize

    96KB

  • memory/4616-150-0x00007FFB06580000-0x00007FFB065BF000-memory.dmp

    Filesize

    252KB

  • memory/4616-140-0x00007FFB07B90000-0x00007FFB07E44000-memory.dmp

    Filesize

    2.7MB

  • memory/4616-157-0x00007FFB06490000-0x00007FFB064A1000-memory.dmp

    Filesize

    68KB

  • memory/4616-188-0x00007FFB065C0000-0x00007FFB0766B000-memory.dmp

    Filesize

    16.7MB