Resubmissions

03-10-2023 14:56

231003-sbdm7scb8z 7

03-10-2023 14:35

231003-rx4abadf82 7

02-10-2023 22:39

231002-2k417afa8s 7

02-10-2023 21:20

231002-z68v6aeg3z 7

Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2023 22:39

General

  • Target

    shoot.ogg

  • Size

    43KB

  • MD5

    ef629770d6b4871e9bb640d164cb201d

  • SHA1

    8c8bef0e4195df67bff3692bdd50154d25a8b3fc

  • SHA256

    649f7c795519e022479451575ca0fa064e5479d0b484c8deb2a82cfb9034eae3

  • SHA512

    0923bc22009234839ea8410ccd3922aef7733df1f5c1403255c854c8dc21234d0fd4c2bee2327f7a302cbbf1e3c0c043e41d92a4dc3532d10fb2f3303e1aa4e5

  • SSDEEP

    768:66zL8fIoH4zjb4nHbAM5Tn/eJHIkUx1IAdvErAMKr9ZgAk+Khy2:66z8I34n7X5T/FrGhow7l

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\shoot.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\shoot.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4176
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4b0 0x300
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4176-5-0x00007FF6B7AE0000-0x00007FF6B7BD8000-memory.dmp

    Filesize

    992KB

  • memory/4176-6-0x00007FFBD9620000-0x00007FFBD9654000-memory.dmp

    Filesize

    208KB

  • memory/4176-7-0x00007FFBC9F20000-0x00007FFBCA1D4000-memory.dmp

    Filesize

    2.7MB

  • memory/4176-8-0x00007FFBD96A0000-0x00007FFBD96B8000-memory.dmp

    Filesize

    96KB

  • memory/4176-9-0x00007FFBD92A0000-0x00007FFBD92B7000-memory.dmp

    Filesize

    92KB

  • memory/4176-11-0x00007FFBD90E0000-0x00007FFBD90F7000-memory.dmp

    Filesize

    92KB

  • memory/4176-10-0x00007FFBD9100000-0x00007FFBD9111000-memory.dmp

    Filesize

    68KB

  • memory/4176-12-0x00007FFBD90C0000-0x00007FFBD90D1000-memory.dmp

    Filesize

    68KB

  • memory/4176-14-0x00007FFBD9080000-0x00007FFBD9091000-memory.dmp

    Filesize

    68KB

  • memory/4176-13-0x00007FFBD90A0000-0x00007FFBD90BD000-memory.dmp

    Filesize

    116KB

  • memory/4176-15-0x00007FFBC9D20000-0x00007FFBC9F20000-memory.dmp

    Filesize

    2.0MB

  • memory/4176-16-0x00007FFBD9010000-0x00007FFBD904F000-memory.dmp

    Filesize

    252KB

  • memory/4176-17-0x00007FFBC8C70000-0x00007FFBC9D1B000-memory.dmp

    Filesize

    16.7MB

  • memory/4176-18-0x00007FFBD8FE0000-0x00007FFBD9001000-memory.dmp

    Filesize

    132KB

  • memory/4176-19-0x00007FFBD8F90000-0x00007FFBD8FA8000-memory.dmp

    Filesize

    96KB

  • memory/4176-20-0x00007FFBD8F70000-0x00007FFBD8F81000-memory.dmp

    Filesize

    68KB

  • memory/4176-21-0x00007FFBD8A70000-0x00007FFBD8A81000-memory.dmp

    Filesize

    68KB

  • memory/4176-22-0x00007FFBD8A50000-0x00007FFBD8A61000-memory.dmp

    Filesize

    68KB

  • memory/4176-23-0x00007FFBD7B80000-0x00007FFBD7B9B000-memory.dmp

    Filesize

    108KB

  • memory/4176-25-0x00007FFBD01A0000-0x00007FFBD01B8000-memory.dmp

    Filesize

    96KB

  • memory/4176-24-0x00007FFBD01C0000-0x00007FFBD01D1000-memory.dmp

    Filesize

    68KB

  • memory/4176-26-0x00007FFBD0170000-0x00007FFBD01A0000-memory.dmp

    Filesize

    192KB

  • memory/4176-27-0x00007FFBCFAA0000-0x00007FFBCFB07000-memory.dmp

    Filesize

    412KB

  • memory/4176-28-0x00007FFBCFA30000-0x00007FFBCFA9F000-memory.dmp

    Filesize

    444KB

  • memory/4176-29-0x00007FFBCFE00000-0x00007FFBCFE11000-memory.dmp

    Filesize

    68KB

  • memory/4176-30-0x00007FFBC86E0000-0x00007FFBC873C000-memory.dmp

    Filesize

    368KB

  • memory/4176-31-0x00007FFBC8680000-0x00007FFBC86D6000-memory.dmp

    Filesize

    344KB

  • memory/4176-32-0x00007FFBCAAE0000-0x00007FFBCAB08000-memory.dmp

    Filesize

    160KB

  • memory/4176-33-0x00007FFBC8650000-0x00007FFBC8674000-memory.dmp

    Filesize

    144KB

  • memory/4176-34-0x00007FFBCFA10000-0x00007FFBCFA27000-memory.dmp

    Filesize

    92KB

  • memory/4176-35-0x00007FFBC8620000-0x00007FFBC8643000-memory.dmp

    Filesize

    140KB

  • memory/4176-37-0x00007FFBC85E0000-0x00007FFBC85F2000-memory.dmp

    Filesize

    72KB

  • memory/4176-36-0x00007FFBC8600000-0x00007FFBC8611000-memory.dmp

    Filesize

    68KB

  • memory/4176-38-0x00007FFBC85B0000-0x00007FFBC85D1000-memory.dmp

    Filesize

    132KB

  • memory/4176-39-0x00007FFBC8590000-0x00007FFBC85A3000-memory.dmp

    Filesize

    76KB

  • memory/4176-40-0x00007FFBC8410000-0x00007FFBC8588000-memory.dmp

    Filesize

    1.5MB

  • memory/4176-41-0x00007FFBC83F0000-0x00007FFBC8407000-memory.dmp

    Filesize

    92KB

  • memory/4176-42-0x00007FFBDB630000-0x00007FFBDB640000-memory.dmp

    Filesize

    64KB

  • memory/4176-43-0x00007FFBC7FA0000-0x00007FFBC7FCF000-memory.dmp

    Filesize

    188KB

  • memory/4176-44-0x00007FFBC7F80000-0x00007FFBC7F91000-memory.dmp

    Filesize

    68KB

  • memory/4176-45-0x00007FFBC7F60000-0x00007FFBC7F76000-memory.dmp

    Filesize

    88KB

  • memory/4176-46-0x00007FFBC7F40000-0x00007FFBC7F55000-memory.dmp

    Filesize

    84KB

  • memory/4176-47-0x00007FFBD9460000-0x00007FFBD9471000-memory.dmp

    Filesize

    68KB

  • memory/4176-48-0x00007FFBD9440000-0x00007FFBD9452000-memory.dmp

    Filesize

    72KB

  • memory/4176-49-0x00007FFBC78E0000-0x00007FFBC7A5A000-memory.dmp

    Filesize

    1.5MB

  • memory/4176-51-0x00007FFBC78A0000-0x00007FFBC78B4000-memory.dmp

    Filesize

    80KB

  • memory/4176-50-0x00007FFBC78C0000-0x00007FFBC78D3000-memory.dmp

    Filesize

    76KB

  • memory/4176-52-0x00007FFBC7880000-0x00007FFBC7891000-memory.dmp

    Filesize

    68KB

  • memory/4176-53-0x00007FFBC7860000-0x00007FFBC7871000-memory.dmp

    Filesize

    68KB

  • memory/4176-55-0x00007FFBC7820000-0x00007FFBC7836000-memory.dmp

    Filesize

    88KB

  • memory/4176-54-0x00007FFBC7840000-0x00007FFBC7851000-memory.dmp

    Filesize

    68KB