Overview
overview
7Static
static
3PC Optimization.rar
windows7-x64
PC Optimization.rar
windows10-2004-x64
3PC Optimiz...on.exe
windows7-x64
7PC Optimiz...on.exe
windows10-2004-x64
7PC Optimiz...ogo.py
windows7-x64
3PC Optimiz...ogo.py
windows10-2004-x64
3PC Optimiz...co.ico
windows7-x64
1PC Optimiz...co.ico
windows10-2004-x64
3PC Optimiz...co.png
windows7-x64
1PC Optimiz...co.png
windows10-2004-x64
3Analysis
-
max time kernel
49s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/03/2023, 21:36
Behavioral task
behavioral1
Sample
PC Optimization.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PC Optimization.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
PC Optimization/PC Optimization.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
PC Optimization/PC Optimization.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
PC Optimization/logo.py
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
PC Optimization/logo.py
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
PC Optimization/pcico.ico
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
PC Optimization/pcico.ico
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
PC Optimization/pcico.png
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
PC Optimization/pcico.png
Resource
win10v2004-20230220-en
Errors
General
-
Target
PC Optimization.rar
-
Size
17.6MB
-
MD5
98ea36ff977467b74d54730f59c4a866
-
SHA1
ccb4f5abf676e970d7582bc76aa9f96e454f31e5
-
SHA256
14322770226ff226c95b06ac17f73b122fcff5f4a7e2a987be0fd88cfd6ff004
-
SHA512
ff2a43d7b24ddb4db2e2a597e96c1acc32d13a5332f95a63fca62e50f3d0862cfb18222d1d87d64563234c1ccf2a43175a9940f3702b2079090220e54971267a
-
SSDEEP
393216:fuWv4O3qd5dzGKGaStv8biN4/lATAZ2ZzL1S2HdUFd7ezunlHRkMnS:fuWvxqNStGi9S2HFFaMgS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1772 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1772 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1476 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1476 AUDIODG.EXE Token: 33 1476 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1476 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1772 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1948 2040 cmd.exe 29 PID 2040 wrote to memory of 1948 2040 cmd.exe 29 PID 2040 wrote to memory of 1948 2040 cmd.exe 29 PID 1948 wrote to memory of 1772 1948 rundll32.exe 30 PID 1948 wrote to memory of 1772 1948 rundll32.exe 30 PID 1948 wrote to memory of 1772 1948 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\PC Optimization.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\PC Optimization.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\PC Optimization.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1636
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1616
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2016
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1536