Overview
overview
3Static
static
3WareHub_Cw...te.rar
windows7-x64
3WareHub_Cw...te.rar
windows10-2004-x64
3WareHub_Cw...by.exe
windows7-x64
1WareHub_Cw...by.exe
windows10-2004-x64
1WareHub_Cw...og.txt
windows7-x64
1WareHub_Cw...og.txt
windows10-2004-x64
1WareHub_Cw...or.dll
windows7-x64
1WareHub_Cw...or.dll
windows10-2004-x64
1WareHub_Cw...LDER/a
windows7-x64
1WareHub_Cw...LDER/a
windows10-2004-x64
1WareHub_Cw.../a.exe
windows7-x64
1WareHub_Cw.../a.exe
windows10-2004-x64
1WareHub_Cw.../a.dll
windows7-x64
1WareHub_Cw.../a.dll
windows10-2004-x64
1WareHub_Cw.../a.txt
windows7-x64
1WareHub_Cw.../a.txt
windows10-2004-x64
1WareHub_Cw...ns.txt
windows7-x64
1WareHub_Cw...ns.txt
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
WareHub_Cw4ck_By_discord.gg_Recte.rar
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
WareHub_Cw4ck_By_discord.gg_Recte.rar
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
WareHub_Cw4ck_By_discord.gg_Recte/Execute Me In Lobby.exe
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
WareHub_Cw4ck_By_discord.gg_Recte/Execute Me In Lobby.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/DebugLog.txt
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/DebugLog.txt
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/SharpMonoInjector.dll
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/SharpMonoInjector.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a
Resource
win7-20231025-en
Behavioral task
behavioral10
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.exe
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.dll
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.txt
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.txt
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
WareHub_Cw4ck_By_discord.gg_Recte/Instructions.txt
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
WareHub_Cw4ck_By_discord.gg_Recte/Instructions.txt
Resource
win10v2004-20231020-en
General
-
Target
WareHub_Cw4ck_By_discord.gg_Recte.rar
-
Size
391KB
-
MD5
b5be31ddaa79e4488dba8b78da29e6f9
-
SHA1
b6bdfe9e86c3a47edad6f39b6da364899dd8eb7b
-
SHA256
52a6bede9118bda5d1699b5f3f6f80b22808691419dd5070975621529b28de40
-
SHA512
58d11933b41f7e058bfcdffdaa372739334785ec8ebae6cc9a95a6a76163e57bf9d95fa952439ba588830500ae309cb96cb952129d05d631fd8ea99bacc0386f
-
SSDEEP
6144:0GwB357tga0fMxA13LOih8K1uLOA6fqXkkyjOthLNMV/MswK31fITnXF8Aqg0mz8:lgdxA13S68J6fGkksoNOMLRbGwxwvWc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2820 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2764 rundll32.exe 2820 vlc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe 2820 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2764 2040 cmd.exe 29 PID 2040 wrote to memory of 2764 2040 cmd.exe 29 PID 2040 wrote to memory of 2764 2040 cmd.exe 29 PID 2764 wrote to memory of 2820 2764 rundll32.exe 30 PID 2764 wrote to memory of 2820 2764 rundll32.exe 30 PID 2764 wrote to memory of 2820 2764 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WareHub_Cw4ck_By_discord.gg_Recte.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\WareHub_Cw4ck_By_discord.gg_Recte.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\WareHub_Cw4ck_By_discord.gg_Recte.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2820
-
-