Analysis

  • max time kernel
    147s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 17:59

General

  • Target

    Deltaruined chapter 2 official release/snd_txtkris.ogg

  • Size

    6KB

  • MD5

    82c0d1038e9a3a623fd4c329eb2e8669

  • SHA1

    27ca490c5deb65a84fe461ec962b07cb68a133f6

  • SHA256

    c8fdad57feee996554287c26691b0a66f6e747d507a729a6cfc82f331e7d4f70

  • SHA512

    c935ea57190e73748f1bc6c22f7a72f6ec03746728d4b78ff89e5bbe570a8e57383976c1d000da81a9a9b38f12f219ff2c453dedbda0a353ab8a0db3cbdc2653

  • SSDEEP

    96:RY32bBoqxPmBl8YE/WJhwupW3ESVh0YxRp2xPJPPPPPPPPPPPPWxjvf3XtPBTF0x:CGttxOrUOJmD0Sz0Yl26jXeK8UGZ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Deltaruined chapter 2 official release\snd_txtkris.ogg"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Deltaruined chapter 2 official release\snd_txtkris.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4024
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x424 0x324
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4024-138-0x00007FF6CEA50000-0x00007FF6CEB48000-memory.dmp

    Filesize

    992KB

  • memory/4024-139-0x00007FFC4E500000-0x00007FFC4E534000-memory.dmp

    Filesize

    208KB

  • memory/4024-140-0x00007FFC4D720000-0x00007FFC4D9D4000-memory.dmp

    Filesize

    2.7MB

  • memory/4024-141-0x00007FFC4FF70000-0x00007FFC4FF88000-memory.dmp

    Filesize

    96KB

  • memory/4024-142-0x00007FFC4E4E0000-0x00007FFC4E4F7000-memory.dmp

    Filesize

    92KB

  • memory/4024-143-0x00007FFC4D610000-0x00007FFC4D621000-memory.dmp

    Filesize

    68KB

  • memory/4024-145-0x00007FFC4D5D0000-0x00007FFC4D5E1000-memory.dmp

    Filesize

    68KB

  • memory/4024-144-0x00007FFC4D5F0000-0x00007FFC4D607000-memory.dmp

    Filesize

    92KB

  • memory/4024-146-0x00007FFC4D5B0000-0x00007FFC4D5CD000-memory.dmp

    Filesize

    116KB

  • memory/4024-147-0x00007FFC4D590000-0x00007FFC4D5A1000-memory.dmp

    Filesize

    68KB

  • memory/4024-148-0x00007FFC4D390000-0x00007FFC4D590000-memory.dmp

    Filesize

    2.0MB

  • memory/4024-149-0x00007FFC4D350000-0x00007FFC4D38F000-memory.dmp

    Filesize

    252KB

  • memory/4024-150-0x00007FFC4D320000-0x00007FFC4D341000-memory.dmp

    Filesize

    132KB

  • memory/4024-151-0x00007FFC4D300000-0x00007FFC4D318000-memory.dmp

    Filesize

    96KB

  • memory/4024-152-0x00007FFC4D2E0000-0x00007FFC4D2F1000-memory.dmp

    Filesize

    68KB

  • memory/4024-153-0x00007FFC4D2C0000-0x00007FFC4D2D1000-memory.dmp

    Filesize

    68KB

  • memory/4024-154-0x00007FFC4D2A0000-0x00007FFC4D2B1000-memory.dmp

    Filesize

    68KB

  • memory/4024-155-0x00007FFC4C1F0000-0x00007FFC4D29B000-memory.dmp

    Filesize

    16.7MB

  • memory/4024-156-0x00007FFC55CA0000-0x00007FFC55CBB000-memory.dmp

    Filesize

    108KB

  • memory/4024-157-0x00007FFC4D6D0000-0x00007FFC4D6E1000-memory.dmp

    Filesize

    68KB

  • memory/4024-158-0x00007FFC4D6B0000-0x00007FFC4D6C8000-memory.dmp

    Filesize

    96KB

  • memory/4024-159-0x00007FFC4D680000-0x00007FFC4D6B0000-memory.dmp

    Filesize

    192KB

  • memory/4024-160-0x00007FFC4C180000-0x00007FFC4C1E7000-memory.dmp

    Filesize

    412KB

  • memory/4024-161-0x00007FFC4C110000-0x00007FFC4C17F000-memory.dmp

    Filesize

    444KB

  • memory/4024-162-0x00007FFC4D660000-0x00007FFC4D671000-memory.dmp

    Filesize

    68KB

  • memory/4024-163-0x00007FFC4C0B0000-0x00007FFC4C10C000-memory.dmp

    Filesize

    368KB

  • memory/4024-164-0x00007FFC4BF30000-0x00007FFC4C0A8000-memory.dmp

    Filesize

    1.5MB

  • memory/4024-167-0x00007FFC4BF00000-0x00007FFC4BF2F000-memory.dmp

    Filesize

    188KB

  • memory/4024-166-0x00007FFC5E170000-0x00007FFC5E180000-memory.dmp

    Filesize

    64KB

  • memory/4024-168-0x00007FFC4BEE0000-0x00007FFC4BEF1000-memory.dmp

    Filesize

    68KB

  • memory/4024-165-0x00007FFC4D640000-0x00007FFC4D657000-memory.dmp

    Filesize

    92KB

  • memory/4024-169-0x00007FFC4BEC0000-0x00007FFC4BED6000-memory.dmp

    Filesize

    88KB

  • memory/4024-170-0x00007FFC4BDF0000-0x00007FFC4BEB5000-memory.dmp

    Filesize

    788KB

  • memory/4024-171-0x00007FFC4BDD0000-0x00007FFC4BDE5000-memory.dmp

    Filesize

    84KB

  • memory/4024-173-0x00007FFC4B840000-0x00007FFC4B852000-memory.dmp

    Filesize

    72KB

  • memory/4024-172-0x00007FFC4B860000-0x00007FFC4B871000-memory.dmp

    Filesize

    68KB

  • memory/4024-174-0x00007FFC4B6C0000-0x00007FFC4B83A000-memory.dmp

    Filesize

    1.5MB