Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 07:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9b1e415b9aae25823cabdf862f28f7e6.exe
Resource
win7-20231215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
9b1e415b9aae25823cabdf862f28f7e6.exe
Resource
win10v2004-20231222-en
8 signatures
150 seconds
General
-
Target
9b1e415b9aae25823cabdf862f28f7e6.exe
-
Size
20KB
-
MD5
9b1e415b9aae25823cabdf862f28f7e6
-
SHA1
d5d2b5c76fa80eb9d63edcf8a8d7b2fc8e016536
-
SHA256
d4782d55235f3c5ab139ca4dc7ed8877f9e0a82dd034e0714e2c28616d3d186a
-
SHA512
9eff802057be9e56cdcdbe340b08d4b1d8ab35fa42fc1ca99d2be55c7d4aa6eb31de285f8b182096b15aa33379e2815f15f2a2f4f7b913ea12950c7b7f6be0fe
-
SSDEEP
96:Cn5PqbLwiwNRFbFeyUI6HCe/Ajjr4oK0mmbGwqeWh4wUOOUXytZUAyCnUZ+IDM+Q:w2SmHwQb0hiqwSUitKCI3y6c24
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\System32\\Shakira_1997_part_1_.Mpeg_.scr" 9b1e415b9aae25823cabdf862f28f7e6.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1240 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 vlc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1240 vlc.exe 1240 vlc.exe 1240 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1240 vlc.exe 1240 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 628 9b1e415b9aae25823cabdf862f28f7e6.exe 1240 vlc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 628 wrote to memory of 4040 628 9b1e415b9aae25823cabdf862f28f7e6.exe 83 PID 628 wrote to memory of 4040 628 9b1e415b9aae25823cabdf862f28f7e6.exe 83 PID 628 wrote to memory of 4040 628 9b1e415b9aae25823cabdf862f28f7e6.exe 83 PID 2920 wrote to memory of 1240 2920 explorer.exe 85 PID 2920 wrote to memory of 1240 2920 explorer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b1e415b9aae25823cabdf862f28f7e6.exe"C:\Users\Admin\AppData\Local\Temp\9b1e415b9aae25823cabdf862f28f7e6.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\explorer.exeexplorer c:\MyLife.mpg2⤵PID:4040
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\MyLife.mpg"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1240
-