Overview
overview
10Static
static
1AllUpdateS...on.rar
windows7-x64
3AllUpdateS...on.rar
windows10-2004-x64
3Final_Setu...ey.rar
windows7-x64
3Final_Setu...ey.rar
windows10-2004-x64
3FullSetup.exe
windows7-x64
10FullSetup.exe
windows10-2004-x64
10Main-PaSsWord.txt
windows7-x64
1Main-PaSsWord.txt
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2023 15:59
Static task
static1
Behavioral task
behavioral1
Sample
AllUpdateSetup_Fully_Version.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AllUpdateSetup_Fully_Version.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Final_Setups_2023_As_PassKey.rar
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Final_Setups_2023_As_PassKey.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
FullSetup.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
FullSetup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Main-PaSsWord.txt
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Main-PaSsWord.txt
Resource
win10v2004-20230220-en
General
-
Target
Final_Setups_2023_As_PassKey.rar
-
Size
16.0MB
-
MD5
4c8385176970e635f4753d8821dbc811
-
SHA1
093fe7c37b04817ab19754e9c015cc6b2a39f397
-
SHA256
20ffe462bc4cd6c33339c0a1a2a908170ea6e438f92f7478ca93cc324f26dd98
-
SHA512
a062356efa56237edaee10e023afc776e3f9c9faa684165876f6fbd260882c05dae6f80f530f328956e8339218d4fa6f203287560ba81276eb7fa05a23627c02
-
SSDEEP
393216:SHBdSuvw6vKQiTfzWo3nRzMce/aXEVDPRN:ShRo6v/ibzHRoceyUlPH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1904 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1904 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
vlc.exepid process 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe 1904 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1904 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2028 wrote to memory of 572 2028 cmd.exe rundll32.exe PID 2028 wrote to memory of 572 2028 cmd.exe rundll32.exe PID 2028 wrote to memory of 572 2028 cmd.exe rundll32.exe PID 572 wrote to memory of 1904 572 rundll32.exe vlc.exe PID 572 wrote to memory of 1904 572 rundll32.exe vlc.exe PID 572 wrote to memory of 1904 572 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Final_Setups_2023_As_PassKey.rar1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Final_Setups_2023_As_PassKey.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Final_Setups_2023_As_PassKey.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-83-0x000000013FD20000-0x000000013FE18000-memory.dmpFilesize
992KB
-
memory/1904-84-0x000007FEF6B60000-0x000007FEF6B94000-memory.dmpFilesize
208KB
-
memory/1904-85-0x000007FEF6130000-0x000007FEF63E4000-memory.dmpFilesize
2.7MB
-
memory/1904-86-0x000007FEFAF10000-0x000007FEFAF28000-memory.dmpFilesize
96KB
-
memory/1904-87-0x000007FEF6B40000-0x000007FEF6B57000-memory.dmpFilesize
92KB
-
memory/1904-88-0x000007FEF6B20000-0x000007FEF6B31000-memory.dmpFilesize
68KB
-
memory/1904-89-0x000007FEF6B00000-0x000007FEF6B17000-memory.dmpFilesize
92KB
-
memory/1904-92-0x000007FEF6560000-0x000007FEF6571000-memory.dmpFilesize
68KB
-
memory/1904-91-0x000007FEF6580000-0x000007FEF659D000-memory.dmpFilesize
116KB
-
memory/1904-90-0x000007FEF6AE0000-0x000007FEF6AF1000-memory.dmpFilesize
68KB
-
memory/1904-93-0x000007FEF4EF0000-0x000007FEF5F9B000-memory.dmpFilesize
16.7MB
-
memory/1904-94-0x000007FEF4CF0000-0x000007FEF4EF0000-memory.dmpFilesize
2.0MB
-
memory/1904-95-0x000007FEF6520000-0x000007FEF655F000-memory.dmpFilesize
252KB
-
memory/1904-96-0x000007FEF6100000-0x000007FEF6121000-memory.dmpFilesize
132KB
-
memory/1904-97-0x000007FEF60E0000-0x000007FEF60F8000-memory.dmpFilesize
96KB
-
memory/1904-98-0x000007FEF60C0000-0x000007FEF60D1000-memory.dmpFilesize
68KB
-
memory/1904-99-0x000007FEF60A0000-0x000007FEF60B1000-memory.dmpFilesize
68KB
-
memory/1904-100-0x000007FEF6080000-0x000007FEF6091000-memory.dmpFilesize
68KB
-
memory/1904-101-0x000007FEF6020000-0x000007FEF603B000-memory.dmpFilesize
108KB
-
memory/1904-102-0x000007FEF6000000-0x000007FEF6011000-memory.dmpFilesize
68KB
-
memory/1904-103-0x000007FEF4CD0000-0x000007FEF4CE8000-memory.dmpFilesize
96KB
-
memory/1904-104-0x000007FEF4CA0000-0x000007FEF4CD0000-memory.dmpFilesize
192KB
-
memory/1904-105-0x000007FEF4C30000-0x000007FEF4C97000-memory.dmpFilesize
412KB
-
memory/1904-106-0x000007FEF4BC0000-0x000007FEF4C2F000-memory.dmpFilesize
444KB
-
memory/1904-107-0x000007FEF4BA0000-0x000007FEF4BB1000-memory.dmpFilesize
68KB
-
memory/1904-108-0x000007FEF4B40000-0x000007FEF4B96000-memory.dmpFilesize
344KB
-
memory/1904-109-0x000007FEF4B10000-0x000007FEF4B38000-memory.dmpFilesize
160KB
-
memory/1904-110-0x000007FEF4AE0000-0x000007FEF4B04000-memory.dmpFilesize
144KB
-
memory/1904-111-0x000007FEF4AC0000-0x000007FEF4AD7000-memory.dmpFilesize
92KB
-
memory/1904-112-0x000007FEF4A90000-0x000007FEF4AB3000-memory.dmpFilesize
140KB
-
memory/1904-113-0x000007FEF4A70000-0x000007FEF4A81000-memory.dmpFilesize
68KB
-
memory/1904-114-0x000007FEF4A50000-0x000007FEF4A62000-memory.dmpFilesize
72KB
-
memory/1904-115-0x000007FEF4A20000-0x000007FEF4A41000-memory.dmpFilesize
132KB
-
memory/1904-116-0x000007FEF4A00000-0x000007FEF4A13000-memory.dmpFilesize
76KB
-
memory/1904-117-0x000007FEF49C0000-0x000007FEF49D2000-memory.dmpFilesize
72KB
-
memory/1904-118-0x000007FEF4880000-0x000007FEF49BB000-memory.dmpFilesize
1.2MB
-
memory/1904-119-0x000007FEF4850000-0x000007FEF487C000-memory.dmpFilesize
176KB
-
memory/1904-120-0x000007FEF4690000-0x000007FEF4842000-memory.dmpFilesize
1.7MB
-
memory/1904-121-0x000007FEF4560000-0x000007FEF45BC000-memory.dmpFilesize
368KB
-
memory/1904-122-0x000007FEF4540000-0x000007FEF4551000-memory.dmpFilesize
68KB
-
memory/1904-123-0x000007FEF44A0000-0x000007FEF4537000-memory.dmpFilesize
604KB
-
memory/1904-124-0x000007FEF4480000-0x000007FEF4492000-memory.dmpFilesize
72KB
-
memory/1904-125-0x000007FEF4240000-0x000007FEF4471000-memory.dmpFilesize
2.2MB
-
memory/1904-126-0x000007FEF4080000-0x000007FEF4192000-memory.dmpFilesize
1.1MB
-
memory/1904-127-0x000007FEF4040000-0x000007FEF4075000-memory.dmpFilesize
212KB
-
memory/1904-129-0x000007FEF3F80000-0x000007FEF3F91000-memory.dmpFilesize
68KB
-
memory/1904-128-0x000007FEF3FA0000-0x000007FEF3FC5000-memory.dmpFilesize
148KB
-
memory/1904-130-0x000007FEF3F10000-0x000007FEF3F71000-memory.dmpFilesize
388KB
-
memory/1904-131-0x000007FEF3A80000-0x000007FEF3A91000-memory.dmpFilesize
68KB
-
memory/1904-132-0x000007FEF3830000-0x000007FEF3842000-memory.dmpFilesize
72KB
-
memory/1904-133-0x000007FEF37C0000-0x000007FEF37D3000-memory.dmpFilesize
76KB
-
memory/1904-134-0x000007FEF3080000-0x000007FEF311F000-memory.dmpFilesize
636KB
-
memory/1904-135-0x000007FEF32C0000-0x000007FEF32D1000-memory.dmpFilesize
68KB
-
memory/1904-136-0x000007FEF31B0000-0x000007FEF32B2000-memory.dmpFilesize
1.0MB
-
memory/1904-137-0x000007FEF3170000-0x000007FEF3181000-memory.dmpFilesize
68KB
-
memory/1904-138-0x000007FEF3150000-0x000007FEF3161000-memory.dmpFilesize
68KB
-
memory/1904-139-0x000007FEF2F80000-0x000007FEF2F91000-memory.dmpFilesize
68KB
-
memory/1904-140-0x000007FEF2F60000-0x000007FEF2F72000-memory.dmpFilesize
72KB
-
memory/1904-141-0x000007FEF2F40000-0x000007FEF2F58000-memory.dmpFilesize
96KB
-
memory/1904-142-0x000007FEF2F20000-0x000007FEF2F36000-memory.dmpFilesize
88KB
-
memory/1904-143-0x000007FEF2EB0000-0x000007FEF2ED9000-memory.dmpFilesize
164KB
-
memory/1904-144-0x000007FEF2E90000-0x000007FEF2EA2000-memory.dmpFilesize
72KB
-
memory/1904-145-0x000007FEF2E70000-0x000007FEF2E81000-memory.dmpFilesize
68KB
-
memory/1904-146-0x000007FEF2E50000-0x000007FEF2E61000-memory.dmpFilesize
68KB