Resubmissions

11-08-2024 12:15

240811-pfbgvstblg 7

Analysis

  • max time kernel
    60s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 08:18

General

  • Target

    SMM_WE/snd_NSMBU_1up_coins.ogg

  • Size

    11KB

  • MD5

    510c3dd25ed67754bc8753bc57d49699

  • SHA1

    4da3f44a8494ab0087fb79e6766b0a90631f12c6

  • SHA256

    ec04a7426d5a445e06cbaa0ffa202c81df69f82d6f9bb89bc386a569ea34a2c5

  • SHA512

    7317edeaa96b6c5282a3d57d22f5c4b7fa874adcb9236209aeebd514ef6bdcb812f37b0a22dbfa63b99c07db244875637de215bedf99b8f4e8bce0f66b9b2273

  • SSDEEP

    192:NqDJopTxIXg1fnEObzcSIIMS+t32m4EajJ0Dx8mjqGeYeXFdNJnbfB2n+udFeJ1Q:NMiJKXg1/E6cBPS+8jEaV0DOYsI+J1kv

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\SMM_WE\snd_NSMBU_1up_coins.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\SMM_WE\snd_NSMBU_1up_coins.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3728
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4bc 0x470
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3728-5-0x00007FF775B80000-0x00007FF775C78000-memory.dmp

    Filesize

    992KB

  • memory/3728-6-0x00007FFA8B310000-0x00007FFA8B344000-memory.dmp

    Filesize

    208KB

  • memory/3728-10-0x00007FFA8AF40000-0x00007FFA8AF51000-memory.dmp

    Filesize

    68KB

  • memory/3728-14-0x00007FFA85910000-0x00007FFA85921000-memory.dmp

    Filesize

    68KB

  • memory/3728-15-0x00007FFA7A750000-0x00007FFA7A95B000-memory.dmp

    Filesize

    2.0MB

  • memory/3728-19-0x00007FFA7CAD0000-0x00007FFA7CAE1000-memory.dmp

    Filesize

    68KB

  • memory/3728-18-0x00007FFA7CAF0000-0x00007FFA7CB08000-memory.dmp

    Filesize

    96KB

  • memory/3728-17-0x00007FFA823E0000-0x00007FFA82401000-memory.dmp

    Filesize

    132KB

  • memory/3728-16-0x00007FFA7CA00000-0x00007FFA7CA41000-memory.dmp

    Filesize

    260KB

  • memory/3728-7-0x00007FFA7AD50000-0x00007FFA7B006000-memory.dmp

    Filesize

    2.7MB

  • memory/3728-22-0x00007FFA7BC40000-0x00007FFA7BC51000-memory.dmp

    Filesize

    68KB

  • memory/3728-21-0x00007FFA7C9E0000-0x00007FFA7C9F1000-memory.dmp

    Filesize

    68KB

  • memory/3728-13-0x00007FFA86D10000-0x00007FFA86D2D000-memory.dmp

    Filesize

    116KB

  • memory/3728-12-0x00007FFA8AA90000-0x00007FFA8AAA1000-memory.dmp

    Filesize

    68KB

  • memory/3728-11-0x00007FFA8AAB0000-0x00007FFA8AAC7000-memory.dmp

    Filesize

    92KB

  • memory/3728-20-0x00007FFA796A0000-0x00007FFA7A750000-memory.dmp

    Filesize

    16.7MB

  • memory/3728-9-0x00007FFA8B840000-0x00007FFA8B857000-memory.dmp

    Filesize

    92KB

  • memory/3728-8-0x00007FFA92BA0000-0x00007FFA92BB8000-memory.dmp

    Filesize

    96KB

  • memory/3728-56-0x00007FFA796A0000-0x00007FFA7A750000-memory.dmp

    Filesize

    16.7MB