Analysis
-
max time kernel
288s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-08-2023 00:28
Static task
static1
Behavioral task
behavioral1
Sample
Geradores_3.rar
Resource
win7-20230712-en
windows7-x64
8 signatures
300 seconds
General
-
Target
Geradores_3.rar
-
Size
8.1MB
-
MD5
a48a1c5ca604125a30968cabf9389717
-
SHA1
f9a43bef80f1c4093fb268f45c2abe0e992562a2
-
SHA256
c7e6d3cc1d08a1554f05165849fd51053471da4fd14e6bae6e1eba74cecc7643
-
SHA512
f27df657ecaf3ff73af8c13fb335777656f859ea2b119aa63c7d3f7254b39d66acf13ecc6fbf0b1e245f61bdd567647a90a45cc9e5c4bb07a6652278f1a4a0b8
-
SSDEEP
196608:YX1aUva4eAiCIjNxO6jn838PB9+PM26BtWdS:W9VJ8y+n8yB9t/WdS
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2460 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2460 vlc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2460 vlc.exe 2460 vlc.exe 2460 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2460 vlc.exe 2460 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2552 wrote to memory of 296 2552 cmd.exe 29 PID 2552 wrote to memory of 296 2552 cmd.exe 29 PID 2552 wrote to memory of 296 2552 cmd.exe 29 PID 296 wrote to memory of 2460 296 rundll32.exe 30 PID 296 wrote to memory of 2460 296 rundll32.exe 30 PID 296 wrote to memory of 2460 296 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Geradores_3.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Geradores_3.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Geradores_3.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2460
-
-