Analysis
-
max time kernel
2621s -
max time network
2283s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
b4aa.mp4
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b4aa.mp4
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
b4aa.mp4
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral4
Sample
b4aa.mp4
Resource
android-x64-20231023.1-en
Behavioral task
behavioral5
Sample
b4aa.mp4
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral6
Sample
b4aa.mp4
Resource
macos-20220504-en
Behavioral task
behavioral7
Sample
b4aa.mp4
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral8
Sample
b4aa.mp4
Resource
debian9-armhf-20231026-en
Behavioral task
behavioral9
Sample
b4aa.mp4
Resource
debian9-mipsbe-20231026-en
Behavioral task
behavioral10
Sample
b4aa.mp4
Resource
debian9-mipsel-20231026-en
General
-
Target
b4aa.mp4
-
Size
2.0MB
-
MD5
66929ff9072ee52a3b0bf6b17444ed02
-
SHA1
000072139977bc1d32a28978a4d5efb82989964b
-
SHA256
31c23d187c70f603c6b2cd738775e8c105a4de991a5321a9e5471cbab10cf574
-
SHA512
8c4c31faacba56d4c960ad1659a6172dc96de5edfd9dc0ea7832d82bc3ec5b91bcbab7614519ebff1a5dc91f85777b399c5431800a2307878fefdf339d2ef533
-
SSDEEP
49152:uh9B5GBaF74f7tiuESWSbiOEhXGrQNORFjLCUvYVYrBY3jfm:uhn5GB27O7tiHdSWlhWrQ8/CUq8BY3j+
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2400 vlc.exe 2620 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2400 vlc.exe 2620 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2400 vlc.exe Token: SeIncBasePriorityPrivilege 2400 vlc.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2620 vlc.exe 2620 vlc.exe 2620 vlc.exe 2620 vlc.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2400 vlc.exe 2620 vlc.exe 2620 vlc.exe 2620 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2400 vlc.exe 2620 vlc.exe
Processes
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\b4aa.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2400
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnprotectOut.3gpp"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2620
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2032
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
552B
MD55140a5f72de2e4e2915f2917a69fa0e2
SHA16af2f1572d9462738286144d2efed421d48f82d2
SHA2565310e68b121b18ba682e260ebc4fde04d17fec4fdf45a7d691d28b661b456b65
SHA512e2d9999a9b2d140cca5fdf5bc952dde7805eb35bdde89b1d65f3e73f1f2a757ec995f781dd57c274e42fd3c96c5bb7904a18748935e3a81cd359c6494538991d
-
Filesize
93KB
MD5478a4a09f4f74e97335cd4d5e9da7ab5
SHA13c4f1dc52a293f079095d0b0370428ec8e8f9315
SHA256884b59950669842f3c45e6da3480cd9a553538b951fb155b435b48ff38683974
SHA512e96719663cd264132a8e1ea8c3f8a148c778a0c68caa2468ba47629393605b197dd9e00efad91f389de9fcc77b04981a0cf87f785f3c645cdc9e4ebd98060ca1