Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2023 01:25

General

  • Target

    installer.rar

  • Size

    2.2MB

  • MD5

    f47e38957e5a4cc47a54621ddd53974e

  • SHA1

    d90df167441c407a9453c6f1b6737278fce67c7b

  • SHA256

    b32cba53b8d0f92a6765dfad0c7d81c95984a5ba3dd567d24b186ad6862c8bbc

  • SHA512

    f71d819a5f98fcf67989e2ba916ad9735783c0f7ba92c808b3722c286acc5fdb9280b6b817ecf785932330b525f19646afe5cb0c20b38f142eea767c71b29d5e

  • SSDEEP

    49152:X86pf36yPjjldDaMR9ejNuJZS9lRf7eeuz9U8TN:XlpfjBLENuJZS9P7NwU8h

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\installer.rar
    1⤵
    • Modifies registry class
    PID:4532
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\installer.rar"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4652-12-0x00007FF70EC70000-0x00007FF70ED68000-memory.dmp

    Filesize

    992KB

  • memory/4652-13-0x00007FFF52020000-0x00007FFF52054000-memory.dmp

    Filesize

    208KB

  • memory/4652-14-0x00007FFF3EF00000-0x00007FFF3F1B4000-memory.dmp

    Filesize

    2.7MB

  • memory/4652-15-0x00007FFF3DAA0000-0x00007FFF3EB4B000-memory.dmp

    Filesize

    16.7MB

  • memory/4652-16-0x00007FFF3D0D0000-0x00007FFF3D1E2000-memory.dmp

    Filesize

    1.1MB