Analysis
-
max time kernel
54s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
screen-capture.webm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
screen-capture.webm
Resource
win10v2004-20240221-en
General
-
Target
screen-capture.webm
-
Size
5.8MB
-
MD5
e8501f118687bbf33d042100d8b571ea
-
SHA1
44d2a0084cb71440aeeb9b4021bb22501f05070b
-
SHA256
8285c83067e9b3f33073a4f8e164aea69aa5ad54bde282f589f9ce568ffd9800
-
SHA512
d8d5d3d8c5b3fd02815407bd74d2d97c591503f2c8fdccd87025f0e8b7ada9149726a2330de1add2dd3d3ca11fd601a5fc206d1d2ab512bc04e381b98d005a36
-
SSDEEP
98304:N2KewtrWBtzhtuaelJWCDhHZFZGnFLnrlAaN/rZxF8RyU3GTTWJWhZ8nJXRdTpzN:NPIg/9QnNhAaR3ao/vIWhZ8J/T9w4Awd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4328 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4328 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3936 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3936 AUDIODG.EXE Token: 33 4328 vlc.exe Token: SeIncBasePriorityPrivilege 4328 vlc.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe 4328 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4328 5036 cmd.exe 88 PID 5036 wrote to memory of 4328 5036 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\screen-capture.webm1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\screen-capture.webm"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e8 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:3936