Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
Alundra (USA) (v1.1).7z
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Alundra (USA) (v1.1).7z
Resource
win10v2004-20240226-en
General
-
Target
Alundra (USA) (v1.1).7z
-
Size
258.6MB
-
MD5
0c040f422bd0ff94c3a9e0c6df3f52a7
-
SHA1
6f6656dd87852477fbbb4de961960fb32a2284b2
-
SHA256
e53b9f8bf9dd191392bea6cd39798dcc290b60da48be5a3e5d96649db897b1a3
-
SHA512
92a8de123e600c1fd66663f644eaec0a9cba01f99923ea1602434df0c3aca11ba535a34957a3c45795b388a0a30598de48cc3dac0f332c9b069becf1dd945dcc
-
SSDEEP
6291456:Kw4hJ4LJSNAXTCP3W3DKm/gAaP6w6fGJwek5NllxEyLHfh:b4hQ6AXTCfWDYF6u2HNlHF75
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2892 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2652 7zFM.exe 2892 vlc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2652 7zFM.exe Token: 35 2652 7zFM.exe Token: SeSecurityPrivilege 2652 7zFM.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2652 7zFM.exe 2652 7zFM.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 vlc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2652 2092 cmd.exe 29 PID 2092 wrote to memory of 2652 2092 cmd.exe 29 PID 2092 wrote to memory of 2652 2092 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Alundra (USA) (v1.1).7z"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Alundra (USA) (v1.1).7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2652
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\Alundra (USA) (v1.1).cue"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD59320ab2f63f3efa4109479eca54795fc
SHA1d7df45cc620f02c4e09e7c560180b69d4b292c37
SHA2562b5af873b80bbeeae210574e8f5e5ed44f834a871dd4eccd08732707e242ea63
SHA5128713cd6cc3d527e755532b3a01c4ba616ecf4a6d66e4d1035cd50bf122b18c234714614ca77743ad968413b01970eb622f96a55ce0f33544bbfbd4f940bb69c3