Analysis

  • max time kernel
    142s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 00:24

General

  • Target

    Undertale/mus_xpart_b.ogg

  • Size

    496KB

  • MD5

    cad302511456bd2cca081ea96081001f

  • SHA1

    66a4acc681ba61e42940d4f2e04371b80fd87dea

  • SHA256

    17f58a8895bcb998f176f2cde5f70e1aea041e7ac895d1d29f9e5c21a170b1ff

  • SHA512

    82bbef6d07d4aa485be746c55af14522ba61602f12591c5655fa29c1f424c79c65d9f87fc7865eb0cf8d531671acf09f55702b831ae5cc55a6a2217f7142e520

  • SSDEEP

    12288:RigdaDrXCcfvxhufZeg4sVXA84v78IVqtS2jFOn09Vg+V:RigwwhDK8YnVqnJOmVg+V

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Undertale\mus_xpart_b.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Undertale\mus_xpart_b.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3592
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4ec 0x3fc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3592-138-0x00007FF77C760000-0x00007FF77C858000-memory.dmp

    Filesize

    992KB

  • memory/3592-139-0x00007FFB35800000-0x00007FFB35834000-memory.dmp

    Filesize

    208KB

  • memory/3592-140-0x00007FFB35540000-0x00007FFB357F4000-memory.dmp

    Filesize

    2.7MB

  • memory/3592-147-0x00007FFB35200000-0x00007FFB35211000-memory.dmp

    Filesize

    68KB

  • memory/3592-146-0x00007FFB35220000-0x00007FFB3523D000-memory.dmp

    Filesize

    116KB

  • memory/3592-148-0x00007FFB35000000-0x00007FFB35200000-memory.dmp

    Filesize

    2.0MB

  • memory/3592-145-0x00007FFB35240000-0x00007FFB35251000-memory.dmp

    Filesize

    68KB

  • memory/3592-144-0x00007FFB35290000-0x00007FFB352A7000-memory.dmp

    Filesize

    92KB

  • memory/3592-143-0x00007FFB352B0000-0x00007FFB352C1000-memory.dmp

    Filesize

    68KB

  • memory/3592-142-0x00007FFB352D0000-0x00007FFB352E7000-memory.dmp

    Filesize

    92KB

  • memory/3592-141-0x00007FFB35F20000-0x00007FFB35F38000-memory.dmp

    Filesize

    96KB

  • memory/3592-150-0x00007FFB33E30000-0x00007FFB33E6F000-memory.dmp

    Filesize

    252KB

  • memory/3592-149-0x00007FFB33EC0000-0x00007FFB34F6B000-memory.dmp

    Filesize

    16.7MB

  • memory/3592-153-0x00007FFB33DC0000-0x00007FFB33DD1000-memory.dmp

    Filesize

    68KB

  • memory/3592-154-0x00007FFB33DA0000-0x00007FFB33DB1000-memory.dmp

    Filesize

    68KB

  • memory/3592-155-0x00007FFB33D80000-0x00007FFB33D91000-memory.dmp

    Filesize

    68KB

  • memory/3592-156-0x00007FFB33D60000-0x00007FFB33D7B000-memory.dmp

    Filesize

    108KB

  • memory/3592-157-0x00007FFB33D40000-0x00007FFB33D51000-memory.dmp

    Filesize

    68KB

  • memory/3592-159-0x00007FFB33CF0000-0x00007FFB33D20000-memory.dmp

    Filesize

    192KB

  • memory/3592-160-0x00007FFB33C80000-0x00007FFB33CE7000-memory.dmp

    Filesize

    412KB

  • memory/3592-162-0x00007FFB33BF0000-0x00007FFB33C01000-memory.dmp

    Filesize

    68KB

  • memory/3592-163-0x00007FFB33B90000-0x00007FFB33BEC000-memory.dmp

    Filesize

    368KB

  • memory/3592-161-0x00007FFB33C10000-0x00007FFB33C7F000-memory.dmp

    Filesize

    444KB

  • memory/3592-158-0x00007FFB33D20000-0x00007FFB33D38000-memory.dmp

    Filesize

    96KB

  • memory/3592-164-0x00007FFB33A10000-0x00007FFB33B88000-memory.dmp

    Filesize

    1.5MB

  • memory/3592-152-0x00007FFB33DE0000-0x00007FFB33DF8000-memory.dmp

    Filesize

    96KB

  • memory/3592-166-0x00007FFB3DBC0000-0x00007FFB3DBD0000-memory.dmp

    Filesize

    64KB

  • memory/3592-165-0x00007FFB339F0000-0x00007FFB33A07000-memory.dmp

    Filesize

    92KB

  • memory/3592-168-0x00007FFB36C20000-0x00007FFB36C31000-memory.dmp

    Filesize

    68KB

  • memory/3592-169-0x00007FFB36C00000-0x00007FFB36C16000-memory.dmp

    Filesize

    88KB

  • memory/3592-170-0x00007FFB36AE0000-0x00007FFB36BA5000-memory.dmp

    Filesize

    788KB

  • memory/3592-172-0x00007FFB36870000-0x00007FFB36881000-memory.dmp

    Filesize

    68KB

  • memory/3592-173-0x00007FFB36850000-0x00007FFB36862000-memory.dmp

    Filesize

    72KB

  • memory/3592-171-0x00007FFB36AC0000-0x00007FFB36AD5000-memory.dmp

    Filesize

    84KB

  • memory/3592-167-0x00007FFB36C40000-0x00007FFB36C6F000-memory.dmp

    Filesize

    188KB

  • memory/3592-174-0x00007FFB33660000-0x00007FFB337DA000-memory.dmp

    Filesize

    1.5MB

  • memory/3592-151-0x00007FFB33E00000-0x00007FFB33E21000-memory.dmp

    Filesize

    132KB

  • memory/3592-186-0x00007FFB33EC0000-0x00007FFB34F6B000-memory.dmp

    Filesize

    16.7MB