Analysis

  • max time kernel
    142s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    07-11-2023 13:42

General

  • Target

    GF_4.ogg

  • Size

    9KB

  • MD5

    cfcad4b4504ddf5fcc5c0c0a60aefcd8

  • SHA1

    7bfbbb1b96ecc2179abac48969c0e0398023c80c

  • SHA256

    26248d26ffa420099cf8760509090149db23f948749621c2af42294790203235

  • SHA512

    834ba1f47eeb7ffe8cbbcb05bf89a92bdc8c0f7add5371bf394d6b45efa7d128564ef13e320d400011c141d97682d0f50168e8a13aede5a90c9b95cc4dc69574

  • SSDEEP

    192:X/ttxOIOWOKxCPs4OLg3/cLX1g/zrbdppyAJFOJ22QfjC:X/tDzCPtchozrBppfzYQbC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\GF_4.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\GF_4.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4304
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4c8 0x2c8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4304-5-0x00007FF63B650000-0x00007FF63B748000-memory.dmp

    Filesize

    992KB

  • memory/4304-6-0x00007FFA08DC0000-0x00007FFA08DF4000-memory.dmp

    Filesize

    208KB

  • memory/4304-7-0x00007FF9FCDD0000-0x00007FF9FD084000-memory.dmp

    Filesize

    2.7MB

  • memory/4304-8-0x00007FFA0AB50000-0x00007FFA0AB68000-memory.dmp

    Filesize

    96KB

  • memory/4304-9-0x00007FFA08C40000-0x00007FFA08C57000-memory.dmp

    Filesize

    92KB

  • memory/4304-10-0x00007FFA08AB0000-0x00007FFA08AC1000-memory.dmp

    Filesize

    68KB

  • memory/4304-11-0x00007FFA08A90000-0x00007FFA08AA7000-memory.dmp

    Filesize

    92KB

  • memory/4304-12-0x00007FFA08510000-0x00007FFA08521000-memory.dmp

    Filesize

    68KB

  • memory/4304-13-0x00007FFA084F0000-0x00007FFA0850D000-memory.dmp

    Filesize

    116KB

  • memory/4304-14-0x00007FFA084D0000-0x00007FFA084E1000-memory.dmp

    Filesize

    68KB

  • memory/4304-15-0x00007FF9FCBD0000-0x00007FF9FCDD0000-memory.dmp

    Filesize

    2.0MB

  • memory/4304-16-0x00007FF9FBB20000-0x00007FF9FCBCB000-memory.dmp

    Filesize

    16.7MB

  • memory/4304-17-0x00007FFA08490000-0x00007FFA084CF000-memory.dmp

    Filesize

    252KB

  • memory/4304-18-0x00007FFA08460000-0x00007FFA08481000-memory.dmp

    Filesize

    132KB

  • memory/4304-20-0x00007FF9FBB00000-0x00007FF9FBB11000-memory.dmp

    Filesize

    68KB

  • memory/4304-22-0x00007FF9FBAC0000-0x00007FF9FBAD1000-memory.dmp

    Filesize

    68KB

  • memory/4304-19-0x00007FFA03150000-0x00007FFA03168000-memory.dmp

    Filesize

    96KB

  • memory/4304-21-0x00007FF9FBAE0000-0x00007FF9FBAF1000-memory.dmp

    Filesize

    68KB

  • memory/4304-23-0x00007FF9FBAA0000-0x00007FF9FBABB000-memory.dmp

    Filesize

    108KB

  • memory/4304-24-0x00007FF9FBA80000-0x00007FF9FBA91000-memory.dmp

    Filesize

    68KB

  • memory/4304-25-0x00007FF9FBA60000-0x00007FF9FBA78000-memory.dmp

    Filesize

    96KB

  • memory/4304-26-0x00007FF9FBA30000-0x00007FF9FBA60000-memory.dmp

    Filesize

    192KB

  • memory/4304-27-0x00007FF9FB9C0000-0x00007FF9FBA27000-memory.dmp

    Filesize

    412KB

  • memory/4304-28-0x00007FF9FB950000-0x00007FF9FB9BF000-memory.dmp

    Filesize

    444KB

  • memory/4304-30-0x00007FF9FB8D0000-0x00007FF9FB92C000-memory.dmp

    Filesize

    368KB

  • memory/4304-31-0x00007FF9FB750000-0x00007FF9FB8C8000-memory.dmp

    Filesize

    1.5MB

  • memory/4304-29-0x00007FF9FB930000-0x00007FF9FB941000-memory.dmp

    Filesize

    68KB

  • memory/4304-33-0x00007FFA0E5D0000-0x00007FFA0E5E0000-memory.dmp

    Filesize

    64KB

  • memory/4304-34-0x00007FF9FB700000-0x00007FF9FB72F000-memory.dmp

    Filesize

    188KB

  • memory/4304-35-0x00007FF9FB6E0000-0x00007FF9FB6F1000-memory.dmp

    Filesize

    68KB

  • memory/4304-36-0x00007FF9FB6C0000-0x00007FF9FB6D6000-memory.dmp

    Filesize

    88KB

  • memory/4304-32-0x00007FF9FB730000-0x00007FF9FB747000-memory.dmp

    Filesize

    92KB

  • memory/4304-37-0x00007FF9FB5F0000-0x00007FF9FB6B5000-memory.dmp

    Filesize

    788KB

  • memory/4304-39-0x00007FF9FB060000-0x00007FF9FB071000-memory.dmp

    Filesize

    68KB

  • memory/4304-38-0x00007FF9FB5D0000-0x00007FF9FB5E5000-memory.dmp

    Filesize

    84KB

  • memory/4304-40-0x00007FF9FB040000-0x00007FF9FB052000-memory.dmp

    Filesize

    72KB

  • memory/4304-41-0x00007FF9FAEC0000-0x00007FF9FB03A000-memory.dmp

    Filesize

    1.5MB