Resubmissions

03/10/2023, 14:56

231003-sbdm7scb8z 7

03/10/2023, 14:35

231003-rx4abadf82 7

02/10/2023, 22:39

231002-2k417afa8s 7

02/10/2023, 21:20

231002-z68v6aeg3z 7

Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 22:39

General

  • Target

    playerexplode.ogg

  • Size

    163KB

  • MD5

    af660e185dbbfb72f7e30311bbd28013

  • SHA1

    a50e062feed661b45a79c51cccf43bcb9a6cb42a

  • SHA256

    f5b62c0027d8cd680f08533702f800ae13217d84f81cf426bffc1b99af3cefab

  • SHA512

    4d950b45847904898ded4309f9e20c4b9bc3de8e7d0f50c4f12626b6cbb50153d263478dac176eebc635607946aa934c3ea351a6246d329046354c436ac77fcb

  • SSDEEP

    3072:LQkpg15Mej4fskkkkkO3AFDxo2dBFCHJ4:0kC/7kkkkkOExo2dBFCp

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\playerexplode.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\playerexplode.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1252
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x444 0x33c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1252-5-0x00007FF789BF0000-0x00007FF789CE8000-memory.dmp

    Filesize

    992KB

  • memory/1252-6-0x00007FF8CF5D0000-0x00007FF8CF604000-memory.dmp

    Filesize

    208KB

  • memory/1252-7-0x00007FF8BFFD0000-0x00007FF8C0284000-memory.dmp

    Filesize

    2.7MB

  • memory/1252-8-0x00007FF8CF6B0000-0x00007FF8CF6C8000-memory.dmp

    Filesize

    96KB

  • memory/1252-9-0x00007FF8CF2D0000-0x00007FF8CF2E7000-memory.dmp

    Filesize

    92KB

  • memory/1252-10-0x00007FF8CE990000-0x00007FF8CE9A1000-memory.dmp

    Filesize

    68KB

  • memory/1252-11-0x00007FF8CE850000-0x00007FF8CE867000-memory.dmp

    Filesize

    92KB

  • memory/1252-12-0x00007FF8C5F60000-0x00007FF8C5F71000-memory.dmp

    Filesize

    68KB

  • memory/1252-14-0x00007FF8C5BC0000-0x00007FF8C5BD1000-memory.dmp

    Filesize

    68KB

  • memory/1252-15-0x00007FF8BFDD0000-0x00007FF8BFFD0000-memory.dmp

    Filesize

    2.0MB

  • memory/1252-16-0x00007FF8C0950000-0x00007FF8C098F000-memory.dmp

    Filesize

    252KB

  • memory/1252-13-0x00007FF8C5F40000-0x00007FF8C5F5D000-memory.dmp

    Filesize

    116KB

  • memory/1252-18-0x00007FF8BECF0000-0x00007FF8BED11000-memory.dmp

    Filesize

    132KB

  • memory/1252-17-0x00007FF8BED20000-0x00007FF8BFDCB000-memory.dmp

    Filesize

    16.7MB

  • memory/1252-19-0x00007FF8BECD0000-0x00007FF8BECE8000-memory.dmp

    Filesize

    96KB

  • memory/1252-20-0x00007FF8BECB0000-0x00007FF8BECC1000-memory.dmp

    Filesize

    68KB

  • memory/1252-21-0x00007FF8BEC90000-0x00007FF8BECA1000-memory.dmp

    Filesize

    68KB

  • memory/1252-22-0x00007FF8BEC70000-0x00007FF8BEC81000-memory.dmp

    Filesize

    68KB

  • memory/1252-23-0x00007FF8BEC50000-0x00007FF8BEC6B000-memory.dmp

    Filesize

    108KB

  • memory/1252-26-0x00007FF8BEBE0000-0x00007FF8BEC10000-memory.dmp

    Filesize

    192KB

  • memory/1252-24-0x00007FF8BEC30000-0x00007FF8BEC41000-memory.dmp

    Filesize

    68KB

  • memory/1252-25-0x00007FF8BEC10000-0x00007FF8BEC28000-memory.dmp

    Filesize

    96KB

  • memory/1252-27-0x00007FF8BEB70000-0x00007FF8BEBD7000-memory.dmp

    Filesize

    412KB

  • memory/1252-28-0x00007FF8BEB00000-0x00007FF8BEB6F000-memory.dmp

    Filesize

    444KB

  • memory/1252-29-0x00007FF8BEAE0000-0x00007FF8BEAF1000-memory.dmp

    Filesize

    68KB

  • memory/1252-30-0x00007FF8BEA80000-0x00007FF8BEADC000-memory.dmp

    Filesize

    368KB

  • memory/1252-31-0x00007FF8BEA20000-0x00007FF8BEA76000-memory.dmp

    Filesize

    344KB

  • memory/1252-32-0x00007FF8BE9F0000-0x00007FF8BEA18000-memory.dmp

    Filesize

    160KB

  • memory/1252-34-0x00007FF8BE8A0000-0x00007FF8BE8B7000-memory.dmp

    Filesize

    92KB

  • memory/1252-33-0x00007FF8BE8C0000-0x00007FF8BE8E4000-memory.dmp

    Filesize

    144KB

  • memory/1252-35-0x00007FF8BE870000-0x00007FF8BE893000-memory.dmp

    Filesize

    140KB

  • memory/1252-36-0x00007FF8BE790000-0x00007FF8BE7A1000-memory.dmp

    Filesize

    68KB

  • memory/1252-37-0x00007FF8BE770000-0x00007FF8BE782000-memory.dmp

    Filesize

    72KB

  • memory/1252-38-0x00007FF8BE740000-0x00007FF8BE761000-memory.dmp

    Filesize

    132KB

  • memory/1252-39-0x00007FF8BE700000-0x00007FF8BE713000-memory.dmp

    Filesize

    76KB

  • memory/1252-40-0x00007FF8BE580000-0x00007FF8BE6F8000-memory.dmp

    Filesize

    1.5MB

  • memory/1252-41-0x00007FF8BE560000-0x00007FF8BE577000-memory.dmp

    Filesize

    92KB

  • memory/1252-42-0x00007FF8CF520000-0x00007FF8CF530000-memory.dmp

    Filesize

    64KB

  • memory/1252-43-0x00007FF8CF4F0000-0x00007FF8CF51F000-memory.dmp

    Filesize

    188KB

  • memory/1252-44-0x00007FF8CF4D0000-0x00007FF8CF4E1000-memory.dmp

    Filesize

    68KB

  • memory/1252-45-0x00007FF8CF4B0000-0x00007FF8CF4C6000-memory.dmp

    Filesize

    88KB

  • memory/1252-46-0x00007FF8CF490000-0x00007FF8CF4A5000-memory.dmp

    Filesize

    84KB

  • memory/1252-48-0x00007FF8CF320000-0x00007FF8CF332000-memory.dmp

    Filesize

    72KB

  • memory/1252-47-0x00007FF8CFF30000-0x00007FF8CFF41000-memory.dmp

    Filesize

    68KB

  • memory/1252-49-0x00007FF8BE3E0000-0x00007FF8BE55A000-memory.dmp

    Filesize

    1.5MB

  • memory/1252-50-0x00007FF8CF300000-0x00007FF8CF313000-memory.dmp

    Filesize

    76KB

  • memory/1252-51-0x00007FF8BE3C0000-0x00007FF8BE3D4000-memory.dmp

    Filesize

    80KB

  • memory/1252-52-0x00007FF8BE3A0000-0x00007FF8BE3B1000-memory.dmp

    Filesize

    68KB

  • memory/1252-53-0x00007FF8BE380000-0x00007FF8BE391000-memory.dmp

    Filesize

    68KB

  • memory/1252-54-0x00007FF8BDB30000-0x00007FF8BDB41000-memory.dmp

    Filesize

    68KB

  • memory/1252-55-0x00007FF8BDB10000-0x00007FF8BDB26000-memory.dmp

    Filesize

    88KB