Analysis

  • max time kernel
    110s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/05/2023, 06:30

General

  • Target

    AppSetup_pas$_4545.rar

  • Size

    38.2MB

  • MD5

    e743b075bb87b76fadfe8724e29626e9

  • SHA1

    62e2ac06ae0d16b75b1381cf5bec8745dc0001e3

  • SHA256

    77e57a4d881a5b5cddba320d24e979679e2d2d739fc7b2ee251a44a4e46ae58f

  • SHA512

    bcdcdbe76d8bf5a3066d09c78ef3d1a1500f1a29b4f6d97417ca1708ab638d56ab5a8c353dd320ae929fd4110351d7bd0041a940d095a8e909f8b5ff0762408e

  • SSDEEP

    786432:hPCLIwbx2li0Eg1EPKSvIwhBN24enjZES0JyRhdFh3G19VRcJf8p+o+g:hPCL1cli0Eg1oKGA4KZaJ2LheXRJx

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\AppSetup_pas$_4545.rar
    1⤵
    • Modifies registry class
    PID:2328
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\AppSetup_pas$_4545.rar"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3256

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

          Filesize

          97B

          MD5

          563eeccb4f76fc4972cb8eb713cf022a

          SHA1

          09cbea916e54e4abad496b87e795a250325c009c

          SHA256

          16765e2870f56f42d58d334df666f10e60a9d4c22ed065a2b101803f30e7d9f2

          SHA512

          cd3dcfe24c16a51e8d67a2e2aa88698a374e9a00df52cdaa6ecd41d0cf1ac055250e5812a739441d85b8e6bbce270b6aa113ee1e150252fc364681892b1ece8d

        • memory/3256-152-0x00007FF6064E0000-0x00007FF6065D8000-memory.dmp

          Filesize

          992KB

        • memory/3256-153-0x00007FF8CE490000-0x00007FF8CE4C4000-memory.dmp

          Filesize

          208KB

        • memory/3256-154-0x00007FF8CDD60000-0x00007FF8CE014000-memory.dmp

          Filesize

          2.7MB

        • memory/3256-155-0x00007FF8CC0F0000-0x00007FF8CD19B000-memory.dmp

          Filesize

          16.7MB

        • memory/3256-156-0x00007FF8CADB0000-0x00007FF8CAEC2000-memory.dmp

          Filesize

          1.1MB