Analysis

  • max time kernel
    138s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2023 13:38

General

  • Target

    Bot Raid-LP.rar

  • Size

    1.6MB

  • MD5

    f8cdf5b56bfcccc9b6b7cc26169cdcef

  • SHA1

    279b5c0f260a08b0dbd56e88a71bfdd16378665e

  • SHA256

    63c22a12ece361ecc816d13578d48e1f966a266e69efe602a46f8bb378cbc3f7

  • SHA512

    b4a2dde7c92ae73e7bf96601e1ad4694d0f35ec16697a18a95202e55665ef8e0db5879978f32960560d619f395f61046e6303b759581fb67f0a504e2366c26f9

  • SSDEEP

    49152:yM6FQjEIIYU7saqEOU3tJYC4lVajbBXL7L3:BmIIGLUdJYl4bBXL7D

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Bot Raid-LP.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Bot Raid-LP.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Bot Raid-LP.rar"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1412-83-0x000000013FCD0000-0x000000013FDC8000-memory.dmp

    Filesize

    992KB

  • memory/1412-84-0x000007FEFB9D0000-0x000007FEFBA04000-memory.dmp

    Filesize

    208KB

  • memory/1412-85-0x000007FEF6630000-0x000007FEF68E4000-memory.dmp

    Filesize

    2.7MB

  • memory/1412-86-0x000007FEFC160000-0x000007FEFC178000-memory.dmp

    Filesize

    96KB

  • memory/1412-87-0x000007FEFB9B0000-0x000007FEFB9C7000-memory.dmp

    Filesize

    92KB

  • memory/1412-88-0x000007FEFB730000-0x000007FEFB741000-memory.dmp

    Filesize

    68KB

  • memory/1412-89-0x000007FEFB710000-0x000007FEFB727000-memory.dmp

    Filesize

    92KB

  • memory/1412-90-0x000007FEF8180000-0x000007FEF8191000-memory.dmp

    Filesize

    68KB

  • memory/1412-91-0x000007FEF8160000-0x000007FEF817D000-memory.dmp

    Filesize

    116KB

  • memory/1412-92-0x000007FEF8140000-0x000007FEF8151000-memory.dmp

    Filesize

    68KB

  • memory/1412-93-0x000007FEF6430000-0x000007FEF6630000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-94-0x000007FEF5380000-0x000007FEF642B000-memory.dmp

    Filesize

    16.7MB

  • memory/1412-95-0x000007FEF80E0000-0x000007FEF811F000-memory.dmp

    Filesize

    252KB

  • memory/1412-96-0x000007FEF80B0000-0x000007FEF80D1000-memory.dmp

    Filesize

    132KB

  • memory/1412-97-0x000007FEF72D0000-0x000007FEF72E8000-memory.dmp

    Filesize

    96KB

  • memory/1412-98-0x000007FEF72B0000-0x000007FEF72C1000-memory.dmp

    Filesize

    68KB

  • memory/1412-99-0x000007FEF7290000-0x000007FEF72A1000-memory.dmp

    Filesize

    68KB

  • memory/1412-100-0x000007FEF7270000-0x000007FEF7281000-memory.dmp

    Filesize

    68KB

  • memory/1412-101-0x000007FEF7250000-0x000007FEF726B000-memory.dmp

    Filesize

    108KB

  • memory/1412-102-0x000007FEF6C80000-0x000007FEF6C91000-memory.dmp

    Filesize

    68KB

  • memory/1412-103-0x000007FEF6C60000-0x000007FEF6C78000-memory.dmp

    Filesize

    96KB

  • memory/1412-104-0x000007FEF5350000-0x000007FEF5380000-memory.dmp

    Filesize

    192KB

  • memory/1412-105-0x000007FEF52E0000-0x000007FEF5347000-memory.dmp

    Filesize

    412KB

  • memory/1412-107-0x000007FEF4DB0000-0x000007FEF4DC1000-memory.dmp

    Filesize

    68KB

  • memory/1412-112-0x000007FEF4520000-0x000007FEF4543000-memory.dmp

    Filesize

    140KB

  • memory/1412-113-0x000007FEF4500000-0x000007FEF4511000-memory.dmp

    Filesize

    68KB

  • memory/1412-111-0x000007FEF4550000-0x000007FEF4567000-memory.dmp

    Filesize

    92KB

  • memory/1412-115-0x000007FEF44B0000-0x000007FEF44D1000-memory.dmp

    Filesize

    132KB

  • memory/1412-117-0x000007FEF4470000-0x000007FEF4482000-memory.dmp

    Filesize

    72KB

  • memory/1412-116-0x000007FEF4490000-0x000007FEF44A3000-memory.dmp

    Filesize

    76KB

  • memory/1412-119-0x000007FEF41C0000-0x000007FEF41EC000-memory.dmp

    Filesize

    176KB

  • memory/1412-118-0x000007FEF4330000-0x000007FEF446B000-memory.dmp

    Filesize

    1.2MB

  • memory/1412-121-0x000007FEF3F30000-0x000007FEF3F8C000-memory.dmp

    Filesize

    368KB

  • memory/1412-122-0x000007FEF3F10000-0x000007FEF3F21000-memory.dmp

    Filesize

    68KB

  • memory/1412-124-0x000007FEF3D50000-0x000007FEF3D62000-memory.dmp

    Filesize

    72KB

  • memory/1412-123-0x000007FEF3E70000-0x000007FEF3F07000-memory.dmp

    Filesize

    604KB

  • memory/1412-125-0x000007FEF3B10000-0x000007FEF3D41000-memory.dmp

    Filesize

    2.2MB

  • memory/1412-120-0x000007FEF4000000-0x000007FEF41B2000-memory.dmp

    Filesize

    1.7MB

  • memory/1412-114-0x000007FEF44E0000-0x000007FEF44F2000-memory.dmp

    Filesize

    72KB

  • memory/1412-128-0x000007FEF3730000-0x000007FEF3755000-memory.dmp

    Filesize

    148KB

  • memory/1412-129-0x000007FEF3710000-0x000007FEF3721000-memory.dmp

    Filesize

    68KB

  • memory/1412-132-0x000007FEF3660000-0x000007FEF3672000-memory.dmp

    Filesize

    72KB

  • memory/1412-135-0x000007FEF3580000-0x000007FEF3591000-memory.dmp

    Filesize

    68KB

  • memory/1412-136-0x000007FEF3470000-0x000007FEF3572000-memory.dmp

    Filesize

    1.0MB

  • memory/1412-144-0x000007FEF3360000-0x000007FEF3372000-memory.dmp

    Filesize

    72KB

  • memory/1412-146-0x000007FEF3320000-0x000007FEF3331000-memory.dmp

    Filesize

    68KB

  • memory/1412-145-0x000007FEF3340000-0x000007FEF3351000-memory.dmp

    Filesize

    68KB

  • memory/1412-143-0x000007FEF3380000-0x000007FEF33A9000-memory.dmp

    Filesize

    164KB

  • memory/1412-142-0x000007FEF33B0000-0x000007FEF33C6000-memory.dmp

    Filesize

    88KB

  • memory/1412-141-0x000007FEF33D0000-0x000007FEF33E8000-memory.dmp

    Filesize

    96KB

  • memory/1412-140-0x000007FEF33F0000-0x000007FEF3402000-memory.dmp

    Filesize

    72KB

  • memory/1412-139-0x000007FEF3410000-0x000007FEF3421000-memory.dmp

    Filesize

    68KB

  • memory/1412-138-0x000007FEF3430000-0x000007FEF3441000-memory.dmp

    Filesize

    68KB

  • memory/1412-137-0x000007FEF3450000-0x000007FEF3461000-memory.dmp

    Filesize

    68KB

  • memory/1412-134-0x000007FEF35A0000-0x000007FEF363F000-memory.dmp

    Filesize

    636KB

  • memory/1412-133-0x000007FEF3640000-0x000007FEF3653000-memory.dmp

    Filesize

    76KB

  • memory/1412-131-0x000007FEF3680000-0x000007FEF3691000-memory.dmp

    Filesize

    68KB

  • memory/1412-130-0x000007FEF36A0000-0x000007FEF3701000-memory.dmp

    Filesize

    388KB

  • memory/1412-127-0x000007FEF3760000-0x000007FEF3795000-memory.dmp

    Filesize

    212KB

  • memory/1412-126-0x000007FEF37A0000-0x000007FEF38B2000-memory.dmp

    Filesize

    1.1MB

  • memory/1412-110-0x000007FEF4590000-0x000007FEF45B4000-memory.dmp

    Filesize

    144KB

  • memory/1412-109-0x000007FEF4600000-0x000007FEF4628000-memory.dmp

    Filesize

    160KB

  • memory/1412-108-0x000007FEF4B20000-0x000007FEF4B76000-memory.dmp

    Filesize

    344KB

  • memory/1412-106-0x000007FEF51D0000-0x000007FEF523F000-memory.dmp

    Filesize

    444KB