Analysis
-
max time kernel
18s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-04-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
Release.rar
Resource
win11-20240426-en
windows11-21h2-x64
8 signatures
300 seconds
General
-
Target
Release.rar
-
Size
1.0MB
-
MD5
d706ea3b34031b9fa4dc61fed8becb05
-
SHA1
d008cd9a81e6e420cf2c679fd650e05fabbce158
-
SHA256
88f2801cd370d3a0a435a1957e80726ddb5cc1e7ba55a92c30cfc4aaa66b9062
-
SHA512
3463c1544e82e82b15a4a7ff97cd0157771d48ccf2b28ea0e584664610bdc8856e83bd88ee4fa2db197f2f2765bbbf9724de797c3ae3be38678a268500746f42
-
SSDEEP
24576:K8xUuNsCJeiUZQU2eU1ju3GzGzRpkvj+8QVGG:KKUXCsiUZQUg1cGlj+8m
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4736 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2920 OpenWith.exe 4736 vlc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4736 vlc.exe 4736 vlc.exe 4736 vlc.exe 4736 vlc.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4736 vlc.exe 4736 vlc.exe 4736 vlc.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 2920 OpenWith.exe 4736 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2920 wrote to memory of 4736 2920 OpenWith.exe 80 PID 2920 wrote to memory of 4736 2920 OpenWith.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Release.rar1⤵
- Modifies registry class
PID:3448
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Release.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4736
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3992