Analysis
-
max time kernel
1770s -
max time network
1652s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
12-07-2023 01:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
MC LAUNCHER.rar
Resource
win7-20230703-en
windows7-x64
8 signatures
1800 seconds
Behavioral task
behavioral2
Sample
MC LAUNCHER.rar
Resource
win10v2004-20230703-en
windows10-2004-x64
4 signatures
1800 seconds
General
-
Target
MC LAUNCHER.rar
-
Size
254KB
-
MD5
fe0b0249d2ae44e9ed458b2e267b81aa
-
SHA1
8bf9d8d73adb078513e38058d6db96ed9ac4f8fb
-
SHA256
b2ed92361b143b7e8d3a78c20ac9b3a11a03c3cee9af9fdf75a4dc57d4b68e74
-
SHA512
29e4982206f96808526bf1a49a413589b88e9e1f676f749c98eb4be128f502478fdd493e0e72d2ec57e4f1b255b83d73f97ad60646eda6f161591e9a639e305b
-
SSDEEP
6144:NLdA/4zWv196TU0BwZb016Zub/JWABzMMA+qr:NLwiWvVFKQaBWAdMP
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2036 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 vlc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2036 vlc.exe 2036 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1060 2408 cmd.exe 29 PID 2408 wrote to memory of 1060 2408 cmd.exe 29 PID 2408 wrote to memory of 1060 2408 cmd.exe 29 PID 1060 wrote to memory of 2036 1060 rundll32.exe 30 PID 1060 wrote to memory of 2036 1060 rundll32.exe 30 PID 1060 wrote to memory of 2036 1060 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MC LAUNCHER.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MC LAUNCHER.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\MC LAUNCHER.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2036
-
-