Analysis

  • max time kernel
    151s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2023, 17:59

General

  • Target

    Deltaruined chapter 2 official release/snd_windowsxp.ogg

  • Size

    51KB

  • MD5

    0594fe4a425383cb23f41f3995c819a6

  • SHA1

    74e7264ebfe292f828f20f345f180681c88d7105

  • SHA256

    34b696a4afacfb2911e2a2a84311f714e1dbab27fe650b799e7bb82405f7076a

  • SHA512

    652f5fd78e45ae8be33f287d27ce84b3509cb726f47b64fc4b28cd4659e6ea8812e0f49a498f25a46dd3ae44a3d4916b0831a24e678a09ea724edeffef3d1b6d

  • SSDEEP

    1536:5m19eNAosTcuOUkvQ3AW9d+cxUITCBZqMa:5o/cD9W7FxUITqZqMa

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Deltaruined chapter 2 official release\snd_windowsxp.ogg"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Deltaruined chapter 2 official release\snd_windowsxp.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:5108
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x304 0x4a8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4928

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4928-175-0x00000250B93B0000-0x00000250B95B8000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-155-0x00007FFEACC90000-0x00007FFEACCA1000-memory.dmp

          Filesize

          68KB

        • memory/5108-159-0x00007FFEACC00000-0x00007FFEACC30000-memory.dmp

          Filesize

          192KB

        • memory/5108-141-0x00007FFEC2B90000-0x00007FFEC2BA8000-memory.dmp

          Filesize

          96KB

        • memory/5108-142-0x00007FFEBE300000-0x00007FFEBE317000-memory.dmp

          Filesize

          92KB

        • memory/5108-143-0x00007FFEBDA60000-0x00007FFEBDA71000-memory.dmp

          Filesize

          68KB

        • memory/5108-144-0x00007FFEB4FE0000-0x00007FFEB4FF7000-memory.dmp

          Filesize

          92KB

        • memory/5108-146-0x00007FFEAF420000-0x00007FFEAF43D000-memory.dmp

          Filesize

          116KB

        • memory/5108-145-0x00007FFEAF6F0000-0x00007FFEAF701000-memory.dmp

          Filesize

          68KB

        • memory/5108-147-0x00007FFEAF400000-0x00007FFEAF411000-memory.dmp

          Filesize

          68KB

        • memory/5108-160-0x00007FFEACB90000-0x00007FFEACBF7000-memory.dmp

          Filesize

          412KB

        • memory/5108-149-0x00007FFEACD40000-0x00007FFEADDEB000-memory.dmp

          Filesize

          16.7MB

        • memory/5108-150-0x00007FFEAF3C0000-0x00007FFEAF3FF000-memory.dmp

          Filesize

          252KB

        • memory/5108-151-0x00007FFEACD10000-0x00007FFEACD31000-memory.dmp

          Filesize

          132KB

        • memory/5108-152-0x00007FFEACCF0000-0x00007FFEACD08000-memory.dmp

          Filesize

          96KB

        • memory/5108-153-0x00007FFEACCD0000-0x00007FFEACCE1000-memory.dmp

          Filesize

          68KB

        • memory/5108-154-0x00007FFEACCB0000-0x00007FFEACCC1000-memory.dmp

          Filesize

          68KB

        • memory/5108-156-0x00007FFEACC70000-0x00007FFEACC8B000-memory.dmp

          Filesize

          108KB

        • memory/5108-138-0x00007FF6085C0000-0x00007FF6086B8000-memory.dmp

          Filesize

          992KB

        • memory/5108-140-0x00007FFEADFF0000-0x00007FFEAE2A4000-memory.dmp

          Filesize

          2.7MB

        • memory/5108-157-0x00007FFEACC50000-0x00007FFEACC61000-memory.dmp

          Filesize

          68KB

        • memory/5108-148-0x00007FFEADDF0000-0x00007FFEADFF0000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-158-0x00007FFEACC30000-0x00007FFEACC48000-memory.dmp

          Filesize

          96KB

        • memory/5108-161-0x00007FFEACB20000-0x00007FFEACB8F000-memory.dmp

          Filesize

          444KB

        • memory/5108-163-0x00007FFEACAA0000-0x00007FFEACAFC000-memory.dmp

          Filesize

          368KB

        • memory/5108-162-0x00007FFEACB00000-0x00007FFEACB11000-memory.dmp

          Filesize

          68KB

        • memory/5108-164-0x00007FFEAC920000-0x00007FFEACA98000-memory.dmp

          Filesize

          1.5MB

        • memory/5108-165-0x00007FFEAC900000-0x00007FFEAC917000-memory.dmp

          Filesize

          92KB

        • memory/5108-166-0x00007FFEBF2E0000-0x00007FFEBF2F0000-memory.dmp

          Filesize

          64KB

        • memory/5108-167-0x00007FFEAC8D0000-0x00007FFEAC8FF000-memory.dmp

          Filesize

          188KB

        • memory/5108-168-0x00007FFEAC8B0000-0x00007FFEAC8C1000-memory.dmp

          Filesize

          68KB

        • memory/5108-169-0x00007FFEAC890000-0x00007FFEAC8A6000-memory.dmp

          Filesize

          88KB

        • memory/5108-170-0x00007FFEAC7C0000-0x00007FFEAC885000-memory.dmp

          Filesize

          788KB

        • memory/5108-171-0x00007FFEAC7A0000-0x00007FFEAC7B5000-memory.dmp

          Filesize

          84KB

        • memory/5108-172-0x00007FFEAC230000-0x00007FFEAC241000-memory.dmp

          Filesize

          68KB

        • memory/5108-173-0x00007FFEAC210000-0x00007FFEAC222000-memory.dmp

          Filesize

          72KB

        • memory/5108-174-0x00007FFEAC090000-0x00007FFEAC20A000-memory.dmp

          Filesize

          1.5MB

        • memory/5108-139-0x00007FFEB5350000-0x00007FFEB5384000-memory.dmp

          Filesize

          208KB

        • memory/5108-178-0x00007FFEADFF0000-0x00007FFEAE2A4000-memory.dmp

          Filesize

          2.7MB