Analysis
-
max time kernel
38s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-06-2023 23:49
Static task
static1
Behavioral task
behavioral1
Sample
Virus Maker.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Virus Maker.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
readme.txt
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
readme.txt
Resource
win10v2004-20230220-en
General
-
Target
Virus Maker.rar
-
Size
82KB
-
MD5
d1f61793e7898df4b27e3345764ceca8
-
SHA1
f03b91146aeaf753b565620a022a238830ed56d4
-
SHA256
d32f3a860b863d38f117c2e7efcaa6909583d418f8578b526a7ed0153529644b
-
SHA512
6491767f6db68886d000b173306377f3b0bf2d6db765ce4c14139c9ad09fa44e6cb75489f3858e45c4000333d2ad517721f81cc48e94de25c75c17cac36bb617
-
SSDEEP
1536:S0s/fG5w2aRBBNACjLkvSrfqAbv0Zarjg5AfDLCNE3Ztg/776X95:5s/+uRBmvMfzrhfbD2NStk76N5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1420 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1124 rundll32.exe 1420 vlc.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe 1420 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1420 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1124 1704 cmd.exe 29 PID 1704 wrote to memory of 1124 1704 cmd.exe 29 PID 1704 wrote to memory of 1124 1704 cmd.exe 29 PID 1124 wrote to memory of 1420 1124 rundll32.exe 30 PID 1124 wrote to memory of 1420 1124 rundll32.exe 30 PID 1124 wrote to memory of 1420 1124 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Virus Maker.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Virus Maker.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Virus Maker.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1420
-
-