Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 01:26

General

  • Target

    AFPS.rar

  • Size

    10KB

  • MD5

    c5a2787d870b9e4166fb34dd4175c746

  • SHA1

    6cfb8e8fab40d38b4b8a959a7e9f381894b8a333

  • SHA256

    9a6b116ac22ae3dbb7a2cf6030d5fb94535c528cf555e21f367e3ef4b7841535

  • SHA512

    5b88e837e47b03b74cc075e46bc4e216dceddc886d3553cc3fa507329519d58f9b2d7b1cdf185f80017f3ccfa2d8c28aac0b313c3492c2b4acf180a3cabb637a

  • SSDEEP

    192:KQwz1Rbm8fw+pshNT+RxOUcoUFB7IP5HSWnSCezURrDZOwAQmCdzTyFns:vwzTbJLWHiRrcoUvIPxS3CEURnZZoCdf

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\AFPS.rar
    1⤵
    • Modifies registry class
    PID:2300
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\AFPS.rar"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4516-12-0x00007FF60C0E0000-0x00007FF60C1D8000-memory.dmp

    Filesize

    992KB

  • memory/4516-13-0x00007FFF24390000-0x00007FFF243C4000-memory.dmp

    Filesize

    208KB

  • memory/4516-14-0x00007FFF0FE30000-0x00007FFF100E6000-memory.dmp

    Filesize

    2.7MB

  • memory/4516-15-0x00007FFF0E1F0000-0x00007FFF0F2A0000-memory.dmp

    Filesize

    16.7MB

  • memory/4516-16-0x00007FFF0DAC0000-0x00007FFF0DBCE000-memory.dmp

    Filesize

    1.1MB