Analysis

  • max time kernel
    326s
  • max time network
    378s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/08/2023, 07:46

General

  • Target

    NUMKASP-V3[@hackers_assemble].rar

  • Size

    7.3MB

  • MD5

    8cbd90c33ecea50e5395397d7a23dcca

  • SHA1

    013eb6066f50223dc7465f7a1b3695a5180b0d58

  • SHA256

    f32a336d1e20c1d80f16fa90c5e4437b9daa8fc224d1a3faa0d1cc4db41c04bd

  • SHA512

    9fc3a3791d52d6565601080a88d3f93edaee13300e660a88173bc5090b2bf730493f755810a0405b7db67f6b09684d98b1a1fe98ee499f24a463b1f96c5efb3f

  • SSDEEP

    196608:pZq++GI8WrCUD0M0KSu01uCQyvnEoCtcidFXOndnCt:pZq3GIlb0M0Y01LQyEoCtP7EO

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\NUMKASP-V3[@hackers_assemble].rar
    1⤵
    • Modifies registry class
    PID:2308
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\NUMKASP-V3[@hackers_assemble].rar"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:684
  • C:\Windows\system32\control.exe
    "C:\Windows\system32\control.exe" /name Microsoft.DeviceManager
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Windows\system32\mmc.exe
      "C:\Windows\system32\mmc.exe" C:\Windows\system32\devmgmt.msc
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:208
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
    1⤵
      PID:4624
    • C:\Windows\system32\control.exe
      "C:\Windows\system32\control.exe" SYSTEM
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3704
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
        PID:4248

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/684-12-0x00007FF639B70000-0x00007FF639C68000-memory.dmp

              Filesize

              992KB

            • memory/684-13-0x00007FFCBE300000-0x00007FFCBE334000-memory.dmp

              Filesize

              208KB

            • memory/684-14-0x00007FFCB9460000-0x00007FFCB9714000-memory.dmp

              Filesize

              2.7MB

            • memory/684-15-0x00007FFCA9890000-0x00007FFCAA93B000-memory.dmp

              Filesize

              16.7MB

            • memory/684-16-0x00007FFCA9530000-0x00007FFCA9642000-memory.dmp

              Filesize

              1.1MB