Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
10003039.ogg
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
10003039.ogg
Resource
win10v2004-20231222-en
10 signatures
150 seconds
General
-
Target
10003039.ogg
-
Size
3.6MB
-
MD5
cf570952b3c8e1da44ed0e7bc9cffe10
-
SHA1
e8dea1e5a5188efc91cb7ad461d0652a02cd8891
-
SHA256
702b1e2507d54c314fe31c9d5dad7ba232647dc6e394b0225a0c4f90ac1888dd
-
SHA512
db3f62c79e178f181429192a44640179800b82410689bb21d473912879d41919897bebe7c1ee787d7a9e1f8b4302690fcbac570407f4377473733b640ab022ac
-
SSDEEP
98304:8mCBKitqrmSuAW8P8+iv/62BuFrp80wPoS/y/ni/Q5Su:8mbit0mdf+iv/fIJgh/y/i/W
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2392 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2392 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4940 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4940 AUDIODG.EXE Token: 33 2392 vlc.exe Token: SeIncBasePriorityPrivilege 2392 vlc.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2392 3056 cmd.exe 25 PID 3056 wrote to memory of 2392 3056 cmd.exe 25
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\10003039.ogg1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\10003039.ogg"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2392
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940