Analysis
-
max time kernel
110s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
AppSetup_pas$_4545.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AppSetup_pas$_4545.rar
Resource
win10v2004-20230220-en
General
-
Target
AppSetup_pas$_4545.rar
-
Size
38.2MB
-
MD5
e743b075bb87b76fadfe8724e29626e9
-
SHA1
62e2ac06ae0d16b75b1381cf5bec8745dc0001e3
-
SHA256
77e57a4d881a5b5cddba320d24e979679e2d2d739fc7b2ee251a44a4e46ae58f
-
SHA512
bcdcdbe76d8bf5a3066d09c78ef3d1a1500f1a29b4f6d97417ca1708ab638d56ab5a8c353dd320ae929fd4110351d7bd0041a940d095a8e909f8b5ff0762408e
-
SSDEEP
786432:hPCLIwbx2li0Eg1EPKSvIwhBN24enjZES0JyRhdFh3G19VRcJf8p+o+g:hPCL1cli0Eg1oKGA4KZaJ2LheXRJx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\.rar OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3256 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5084 OpenWith.exe 3256 vlc.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe 3256 vlc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 3256 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3256 5084 OpenWith.exe 93 PID 5084 wrote to memory of 3256 5084 OpenWith.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AppSetup_pas$_4545.rar1⤵
- Modifies registry class
PID:2328
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\AppSetup_pas$_4545.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3256
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5563eeccb4f76fc4972cb8eb713cf022a
SHA109cbea916e54e4abad496b87e795a250325c009c
SHA25616765e2870f56f42d58d334df666f10e60a9d4c22ed065a2b101803f30e7d9f2
SHA512cd3dcfe24c16a51e8d67a2e2aa88698a374e9a00df52cdaa6ecd41d0cf1ac055250e5812a739441d85b8e6bbce270b6aa113ee1e150252fc364681892b1ece8d