Analysis
-
max time kernel
140s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2023, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
Google_AI.rar
Resource
win7-20230220-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Google_AI.rar
Resource
win10v2004-20230220-en
3 signatures
150 seconds
General
-
Target
Google_AI.rar
-
Size
300KB
-
MD5
ce8144d8e1d782dbce849d59832d7139
-
SHA1
385672526a44d192e4c76f70fca81b6ee19d3ad6
-
SHA256
dd0730019f4ca61b226f6d6a3f93cb67e260fd83b804a8f9b89abf82714cf8e9
-
SHA512
74917b32fa8b8dd7bb82c5d8c4da7b630728ba30366417ec1c4cdc392ff9ac1d282a2543d05a99e664f1e3f50f5370e5a8c1011ad1037627e64fc11582fb01f9
-
SSDEEP
6144:QexfoIpYRY6BTwueskOglRTBCf6L0GhBvOJhI/JzJaYpcvBW2:QAQIpYRY6BTEtOACfoHTX/Jzpcl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 524 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 524 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe 524 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 524 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1316 1100 cmd.exe 27 PID 1100 wrote to memory of 1316 1100 cmd.exe 27 PID 1100 wrote to memory of 1316 1100 cmd.exe 27 PID 1316 wrote to memory of 524 1316 rundll32.exe 28 PID 1316 wrote to memory of 524 1316 rundll32.exe 28 PID 1316 wrote to memory of 524 1316 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Google_AI.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Google_AI.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Google_AI.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:524
-
-