Resubmissions

03/10/2023, 14:56

231003-sbdm7scb8z 7

03/10/2023, 14:35

231003-rx4abadf82 7

02/10/2023, 22:39

231002-2k417afa8s 7

02/10/2023, 21:20

231002-z68v6aeg3z 7

Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 22:39

General

  • Target

    uh.ogg

  • Size

    14KB

  • MD5

    9223b207343d8cea833932df3ee65218

  • SHA1

    c4d216d376b6a498b3917d88d8c120ee30bb109b

  • SHA256

    bd7bfac235f120e746e0e31374df5a2fb20844a80e79551324fe76387d5d7395

  • SHA512

    d3d2d9824972088d8856bb4318304a81e3224fe4f41a3ac537e306827de3d5cb4c24b76dc03d7f8ff0b6917de84a36e41eaeb2d5751e9467653e3c281ad2fc43

  • SSDEEP

    192:Eqk+XioqPKNLKt9AadirT9NayoNGa9eDT9NayoNGa9eDT9hCMT2cGt/RwSFbjkmB:EGi4xOi3Xay2ePXay2ePYHtJ1Fbjk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\uh.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\uh.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2664
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x500 0x2ec
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2664-5-0x00007FF613490000-0x00007FF613588000-memory.dmp

    Filesize

    992KB

  • memory/2664-6-0x00007FF879E50000-0x00007FF879E84000-memory.dmp

    Filesize

    208KB

  • memory/2664-7-0x00007FF86EA30000-0x00007FF86ECE4000-memory.dmp

    Filesize

    2.7MB

  • memory/2664-8-0x00007FF87D8E0000-0x00007FF87D8F8000-memory.dmp

    Filesize

    96KB

  • memory/2664-9-0x00007FF87CE70000-0x00007FF87CE87000-memory.dmp

    Filesize

    92KB

  • memory/2664-13-0x00007FF879DF0000-0x00007FF879E0D000-memory.dmp

    Filesize

    116KB

  • memory/2664-14-0x00007FF879DD0000-0x00007FF879DE1000-memory.dmp

    Filesize

    68KB

  • memory/2664-12-0x00007FF879E10000-0x00007FF879E21000-memory.dmp

    Filesize

    68KB

  • memory/2664-11-0x00007FF879E30000-0x00007FF879E47000-memory.dmp

    Filesize

    92KB

  • memory/2664-10-0x00007FF87A100000-0x00007FF87A111000-memory.dmp

    Filesize

    68KB

  • memory/2664-15-0x00007FF86E830000-0x00007FF86EA30000-memory.dmp

    Filesize

    2.0MB

  • memory/2664-17-0x00007FF879D90000-0x00007FF879DCF000-memory.dmp

    Filesize

    252KB

  • memory/2664-19-0x00007FF879D40000-0x00007FF879D58000-memory.dmp

    Filesize

    96KB

  • memory/2664-18-0x00007FF879D60000-0x00007FF879D81000-memory.dmp

    Filesize

    132KB

  • memory/2664-20-0x00007FF879D20000-0x00007FF879D31000-memory.dmp

    Filesize

    68KB

  • memory/2664-23-0x00007FF879CC0000-0x00007FF879CDB000-memory.dmp

    Filesize

    108KB

  • memory/2664-27-0x00007FF879970000-0x00007FF8799D7000-memory.dmp

    Filesize

    412KB

  • memory/2664-29-0x00007FF87DCD0000-0x00007FF87DCE1000-memory.dmp

    Filesize

    68KB

  • memory/2664-28-0x00007FF87DCF0000-0x00007FF87DD5F000-memory.dmp

    Filesize

    444KB

  • memory/2664-30-0x00007FF879910000-0x00007FF87996C000-memory.dmp

    Filesize

    368KB

  • memory/2664-26-0x00007FF8799E0000-0x00007FF879A10000-memory.dmp

    Filesize

    192KB

  • memory/2664-33-0x00007FF874690000-0x00007FF8746B4000-memory.dmp

    Filesize

    144KB

  • memory/2664-32-0x00007FF87DCA0000-0x00007FF87DCC8000-memory.dmp

    Filesize

    160KB

  • memory/2664-35-0x00007FF874660000-0x00007FF874683000-memory.dmp

    Filesize

    140KB

  • memory/2664-34-0x00007FF879890000-0x00007FF8798A7000-memory.dmp

    Filesize

    92KB

  • memory/2664-38-0x00007FF86F0E0000-0x00007FF86F101000-memory.dmp

    Filesize

    132KB

  • memory/2664-39-0x00007FF8742E0000-0x00007FF8742F3000-memory.dmp

    Filesize

    76KB

  • memory/2664-37-0x00007FF878E30000-0x00007FF878E42000-memory.dmp

    Filesize

    72KB

  • memory/2664-36-0x00007FF879800000-0x00007FF879811000-memory.dmp

    Filesize

    68KB

  • memory/2664-47-0x00007FF87DAB0000-0x00007FF87DAC1000-memory.dmp

    Filesize

    68KB

  • memory/2664-48-0x00007FF87CF80000-0x00007FF87CF92000-memory.dmp

    Filesize

    72KB

  • memory/2664-50-0x00007FF87A3C0000-0x00007FF87A3D3000-memory.dmp

    Filesize

    76KB

  • memory/2664-51-0x00007FF86E380000-0x00007FF86E394000-memory.dmp

    Filesize

    80KB

  • memory/2664-55-0x00007FF86C170000-0x00007FF86C186000-memory.dmp

    Filesize

    88KB

  • memory/2664-54-0x00007FF86C190000-0x00007FF86C1A1000-memory.dmp

    Filesize

    68KB

  • memory/2664-53-0x00007FF86C1B0000-0x00007FF86C1C1000-memory.dmp

    Filesize

    68KB

  • memory/2664-52-0x00007FF86C1D0000-0x00007FF86C1E1000-memory.dmp

    Filesize

    68KB

  • memory/2664-49-0x00007FF86C660000-0x00007FF86C7DA000-memory.dmp

    Filesize

    1.5MB

  • memory/2664-46-0x00007FF87DAD0000-0x00007FF87DAE5000-memory.dmp

    Filesize

    84KB

  • memory/2664-45-0x00007FF87DAF0000-0x00007FF87DB06000-memory.dmp

    Filesize

    88KB

  • memory/2664-44-0x00007FF87DB10000-0x00007FF87DB21000-memory.dmp

    Filesize

    68KB

  • memory/2664-43-0x00007FF87DB30000-0x00007FF87DB5F000-memory.dmp

    Filesize

    188KB

  • memory/2664-42-0x00007FF883350000-0x00007FF883360000-memory.dmp

    Filesize

    64KB

  • memory/2664-41-0x00007FF86E690000-0x00007FF86E6A7000-memory.dmp

    Filesize

    92KB

  • memory/2664-40-0x00007FF86E6B0000-0x00007FF86E828000-memory.dmp

    Filesize

    1.5MB

  • memory/2664-31-0x00007FF8798B0000-0x00007FF879906000-memory.dmp

    Filesize

    344KB

  • memory/2664-25-0x00007FF879A10000-0x00007FF879A28000-memory.dmp

    Filesize

    96KB

  • memory/2664-24-0x00007FF879A30000-0x00007FF879A41000-memory.dmp

    Filesize

    68KB

  • memory/2664-22-0x00007FF879CE0000-0x00007FF879CF1000-memory.dmp

    Filesize

    68KB

  • memory/2664-21-0x00007FF879D00000-0x00007FF879D11000-memory.dmp

    Filesize

    68KB

  • memory/2664-16-0x00007FF86D200000-0x00007FF86E2AB000-memory.dmp

    Filesize

    16.7MB