Resubmissions

01-11-2023 06:15

231101-gzwcdabd61 10

01-11-2023 06:14

231101-gzk7eabd6z 6

01-11-2023 05:56

231101-gm3kxsbc3z 6

01-11-2023 05:48

231101-ghw8cadd36 1

01-11-2023 05:45

231101-gftz7sbb6z 1

Analysis

  • max time kernel
    125s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2023 05:45

General

  • Target

    y+tu+keri+o+nooo++#magicgang.mp4

  • Size

    593KB

  • MD5

    017ef81026c1956d8c5cdd2eb68b51c4

  • SHA1

    7a511485e691cc1a7a299f11b5be49fb7e32fd2f

  • SHA256

    51db95fb72ba2b52a47d6824bc65cf055852e7e71b517c282004e47001b631f2

  • SHA512

    44fb405addc45d3efce74e4ddf1542ff50a74c468b38767f11816dce9a8274cd2430f3bf92f20343f470dfa20923458b3f603c0adff65554ccc9f42f57065ef8

  • SSDEEP

    12288:Odeu59/kMA28kWqKF3oa8yzC02xQum10HDdwwvego0BHmdfxqaf:OB/PfmRoNy202nmaHDdwwvelfkaf

Score
1/10

Malware Config

Signatures

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\y+tu+keri+o+nooo++#magicgang.mp4"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1208
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\system32\ipconfig.exe
      ipconfig
      2⤵
      • Gathers network information
      PID:2996
    • C:\Windows\system32\PING.EXE
      ping localhost
      2⤵
      • Runs ping.exe
      PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1208-7-0x000000013F520000-0x000000013F618000-memory.dmp

    Filesize

    992KB

  • memory/1208-8-0x000007FEFABB0000-0x000007FEFABE4000-memory.dmp

    Filesize

    208KB

  • memory/1208-10-0x000007FEFBB00000-0x000007FEFBB18000-memory.dmp

    Filesize

    96KB

  • memory/1208-9-0x000007FEF6120000-0x000007FEF63D4000-memory.dmp

    Filesize

    2.7MB

  • memory/1208-11-0x000007FEFB180000-0x000007FEFB197000-memory.dmp

    Filesize

    92KB

  • memory/1208-12-0x000007FEF79B0000-0x000007FEF79C1000-memory.dmp

    Filesize

    68KB

  • memory/1208-13-0x000007FEF7990000-0x000007FEF79A7000-memory.dmp

    Filesize

    92KB

  • memory/1208-14-0x000007FEF7970000-0x000007FEF7981000-memory.dmp

    Filesize

    68KB

  • memory/1208-15-0x000007FEF78D0000-0x000007FEF78ED000-memory.dmp

    Filesize

    116KB

  • memory/1208-16-0x000007FEF78B0000-0x000007FEF78C1000-memory.dmp

    Filesize

    68KB

  • memory/1208-17-0x000007FEF5F20000-0x000007FEF6120000-memory.dmp

    Filesize

    2.0MB

  • memory/1208-18-0x000007FEF7870000-0x000007FEF78AF000-memory.dmp

    Filesize

    252KB

  • memory/1208-32-0x000007FEFABB0000-0x000007FEFABE4000-memory.dmp

    Filesize

    208KB

  • memory/1208-31-0x000000013F520000-0x000000013F618000-memory.dmp

    Filesize

    992KB

  • memory/1208-33-0x000007FEF6120000-0x000007FEF63D4000-memory.dmp

    Filesize

    2.7MB

  • memory/1208-34-0x000007FEF4E70000-0x000007FEF5F1B000-memory.dmp

    Filesize

    16.7MB