Analysis
-
max time kernel
587s -
max time network
379s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
4k Video Downloader 4.28.0.5600 - XYZ.rar
Resource
win7-20231020-en
8 signatures
600 seconds
Behavioral task
behavioral2
Sample
4k Video Downloader 4.28.0.5600 - XYZ.rar
Resource
win10v2004-20231023-en
3 signatures
600 seconds
General
-
Target
4k Video Downloader 4.28.0.5600 - XYZ.rar
-
Size
174.3MB
-
MD5
8c18f8a5c9b4fc5870eef1970e441d55
-
SHA1
9ec3719006330108b7f19a5d72f19fa1de51893e
-
SHA256
85b541461b8066b2d6740d438ab3fc35622ce614d974f7e559d77d2fd381b04d
-
SHA512
10bddd72b7baffb9f91671836dc98141f02ae042e14f36e3b0f77768dfaed51f4f956a7d116cce210e6eba90322ff5917f1bad6050fa266a58bd0f0c67b45ae9
-
SSDEEP
3145728:xibVNMxKYrVR1XujDH4a7aCSRQ56qoXdSITNM1S95pSnJN:UZNMxKYpaDp4W5QsIpM12KH
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2816 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe 2816 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2816 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2772 2344 cmd.exe 29 PID 2344 wrote to memory of 2772 2344 cmd.exe 29 PID 2344 wrote to memory of 2772 2344 cmd.exe 29 PID 2772 wrote to memory of 2816 2772 rundll32.exe 30 PID 2772 wrote to memory of 2816 2772 rundll32.exe 30 PID 2772 wrote to memory of 2816 2772 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\4k Video Downloader 4.28.0.5600 - XYZ.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\4k Video Downloader 4.28.0.5600 - XYZ.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\4k Video Downloader 4.28.0.5600 - XYZ.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2816
-
-