Analysis

  • max time kernel
    141s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    07/11/2023, 13:42

General

  • Target

    DISTORTO.ogg

  • Size

    1.2MB

  • MD5

    ff9593297b7efc3f559d2feb1e67fa4a

  • SHA1

    f515831ab4879c044899e63f944cb5be17712120

  • SHA256

    94b2a8f276fe0903da26aefeda3803f16a6d222bff3ca86fc28ef6478dbe403a

  • SHA512

    0518dd275c2882d32d9a8af36664a403633c5dbd0d2947b5796f47053e03d4eec6f422fe75a33a4bef8a678cf0ee3b72871d1db0f52e052a025457ccf11c5315

  • SSDEEP

    24576:wJA8ole67gdQ57Cv2nrUq1SSWs+7vBBJYeJCZBzn9XHOo:mA8ole67gdQ57Cv2rDSSWpvBBJYqCZxf

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DISTORTO.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\DISTORTO.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:636
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x51c 0x308
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3808

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/636-5-0x00007FF602380000-0x00007FF602478000-memory.dmp

          Filesize

          992KB

        • memory/636-6-0x00007FF87F3F0000-0x00007FF87F424000-memory.dmp

          Filesize

          208KB

        • memory/636-7-0x00007FF86F920000-0x00007FF86FBD4000-memory.dmp

          Filesize

          2.7MB

        • memory/636-14-0x00007FF87EBF0000-0x00007FF87EC01000-memory.dmp

          Filesize

          68KB

        • memory/636-13-0x00007FF87EC10000-0x00007FF87EC2D000-memory.dmp

          Filesize

          116KB

        • memory/636-12-0x00007FF87EC30000-0x00007FF87EC41000-memory.dmp

          Filesize

          68KB

        • memory/636-11-0x00007FF87EF30000-0x00007FF87EF47000-memory.dmp

          Filesize

          92KB

        • memory/636-10-0x00007FF87EF50000-0x00007FF87EF61000-memory.dmp

          Filesize

          68KB

        • memory/636-9-0x00007FF87F550000-0x00007FF87F567000-memory.dmp

          Filesize

          92KB

        • memory/636-8-0x00007FF87F780000-0x00007FF87F798000-memory.dmp

          Filesize

          96KB

        • memory/636-15-0x00007FF86F720000-0x00007FF86F920000-memory.dmp

          Filesize

          2.0MB

        • memory/636-16-0x00007FF86E670000-0x00007FF86F71B000-memory.dmp

          Filesize

          16.7MB

        • memory/636-28-0x00007FF86E600000-0x00007FF86E66F000-memory.dmp

          Filesize

          444KB

        • memory/636-29-0x00007FF8707A0000-0x00007FF8707B1000-memory.dmp

          Filesize

          68KB

        • memory/636-30-0x00007FF86E5A0000-0x00007FF86E5FC000-memory.dmp

          Filesize

          368KB

        • memory/636-25-0x00007FF870860000-0x00007FF870878000-memory.dmp

          Filesize

          96KB

        • memory/636-31-0x00007FF86E420000-0x00007FF86E598000-memory.dmp

          Filesize

          1.5MB

        • memory/636-24-0x00007FF870880000-0x00007FF870891000-memory.dmp

          Filesize

          68KB

        • memory/636-32-0x00007FF870550000-0x00007FF870567000-memory.dmp

          Filesize

          92KB

        • memory/636-34-0x00007FF86E3F0000-0x00007FF86E41F000-memory.dmp

          Filesize

          188KB

        • memory/636-35-0x00007FF86E3D0000-0x00007FF86E3E1000-memory.dmp

          Filesize

          68KB

        • memory/636-36-0x00007FF86E3B0000-0x00007FF86E3C6000-memory.dmp

          Filesize

          88KB

        • memory/636-33-0x00007FF885020000-0x00007FF885030000-memory.dmp

          Filesize

          64KB

        • memory/636-23-0x00007FF870ED0000-0x00007FF870EEB000-memory.dmp

          Filesize

          108KB

        • memory/636-22-0x00007FF870EF0000-0x00007FF870F01000-memory.dmp

          Filesize

          68KB

        • memory/636-21-0x00007FF870F10000-0x00007FF870F21000-memory.dmp

          Filesize

          68KB

        • memory/636-20-0x00007FF8710F0000-0x00007FF871101000-memory.dmp

          Filesize

          68KB

        • memory/636-37-0x00007FF86E2E0000-0x00007FF86E3A5000-memory.dmp

          Filesize

          788KB

        • memory/636-40-0x00007FF86DD00000-0x00007FF86DD12000-memory.dmp

          Filesize

          72KB

        • memory/636-41-0x00007FF86DB80000-0x00007FF86DCFA000-memory.dmp

          Filesize

          1.5MB

        • memory/636-39-0x00007FF86DD20000-0x00007FF86DD31000-memory.dmp

          Filesize

          68KB

        • memory/636-38-0x00007FF86E2C0000-0x00007FF86E2D5000-memory.dmp

          Filesize

          84KB

        • memory/636-19-0x00007FF87EBD0000-0x00007FF87EBE8000-memory.dmp

          Filesize

          96KB

        • memory/636-18-0x00007FF876440000-0x00007FF876461000-memory.dmp

          Filesize

          132KB

        • memory/636-27-0x00007FF8707C0000-0x00007FF870827000-memory.dmp

          Filesize

          412KB

        • memory/636-26-0x00007FF870830000-0x00007FF870860000-memory.dmp

          Filesize

          192KB

        • memory/636-17-0x00007FF876470000-0x00007FF8764AF000-memory.dmp

          Filesize

          252KB

        • memory/636-44-0x00007FF86F920000-0x00007FF86FBD4000-memory.dmp

          Filesize

          2.7MB