Analysis

  • max time kernel
    152s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2023, 17:59

General

  • Target

    Deltaruined chapter 2 official release/snd_txtdirector.ogg

  • Size

    4KB

  • MD5

    8963f3bc2f6b3c312bd7df22a06c8b92

  • SHA1

    e04dc7063c273c64f409a3dcb0bf7585421eac62

  • SHA256

    5203a684a9e55e940cbda04aa265a74aa5176bdced1ab7a8c724e2bf2cbc328e

  • SHA512

    7b686c1f0e08d61630546b56657db8a3783738d65cd051dd715c6982d92320c192859940e8287f090f55c2363ab5a5bf3a435ea7a27e0ad96a7b218a80b83f1d

  • SSDEEP

    96:wZIzOrVko1BJoQgbOkyGUsekENPPIHbSB1R6JKUH0F3J:QtDJo+OFSt73v

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Deltaruined chapter 2 official release\snd_txtdirector.ogg"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Deltaruined chapter 2 official release\snd_txtdirector.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4128

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4128-133-0x00007FF7106E0000-0x00007FF7107D8000-memory.dmp

          Filesize

          992KB

        • memory/4128-135-0x00007FFAC58A0000-0x00007FFAC58D4000-memory.dmp

          Filesize

          208KB

        • memory/4128-136-0x00007FFAB5C20000-0x00007FFAB5ED4000-memory.dmp

          Filesize

          2.7MB

        • memory/4128-137-0x00007FF7106E0000-0x00007FF7107D8000-memory.dmp

          Filesize

          992KB

        • memory/4128-138-0x00007FFAC58A0000-0x00007FFAC58D4000-memory.dmp

          Filesize

          208KB

        • memory/4128-139-0x00007FFAB5C20000-0x00007FFAB5ED4000-memory.dmp

          Filesize

          2.7MB

        • memory/4128-140-0x00007FFAC5D20000-0x00007FFAC5D38000-memory.dmp

          Filesize

          96KB

        • memory/4128-141-0x00007FFAB6B10000-0x00007FFAB6B27000-memory.dmp

          Filesize

          92KB

        • memory/4128-143-0x00007FFAB6AD0000-0x00007FFAB6AE7000-memory.dmp

          Filesize

          92KB

        • memory/4128-142-0x00007FFAB6AF0000-0x00007FFAB6B01000-memory.dmp

          Filesize

          68KB

        • memory/4128-144-0x00007FFAB6A80000-0x00007FFAB6A91000-memory.dmp

          Filesize

          68KB

        • memory/4128-145-0x00007FFAB6560000-0x00007FFAB657D000-memory.dmp

          Filesize

          116KB

        • memory/4128-146-0x00007FFAB6540000-0x00007FFAB6551000-memory.dmp

          Filesize

          68KB