Analysis
-
max time kernel
35s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 18:14
Behavioral task
behavioral1
Sample
bombaclat2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bombaclat2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
cstealer.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
cstealer.pyc
Resource
win10v2004-20240419-en
General
-
Target
bombaclat2.exe
-
Size
16.8MB
-
MD5
24669cf992c3daad92955430b133615c
-
SHA1
f2a90c7b952bb2c224224c5154b12083ecfdba84
-
SHA256
55b7d24cefb8793f271bc910bc45dcdcd007d12655a1e311f25835fcbcd8affc
-
SHA512
1de9a4e63ec73f46738b1afd0fa561156958c5b49e9735e6bd93db6e3399e80e944bf3771c23ab1485197e23580a96222d1c208c6730b37d16ee476baae20065
-
SSDEEP
393216:kmAzc28DEkMgP8AxYDwdQ2lR+9JCe48rBLFdxJd6o:k1D8D0bXsdQv9JCe48Fd
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2252 bombaclat2.exe 2252 bombaclat2.exe 2252 bombaclat2.exe 2252 bombaclat2.exe 2252 bombaclat2.exe 2252 bombaclat2.exe 2252 bombaclat2.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 380 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 380 vlc.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe 380 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 380 vlc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2252 1908 bombaclat2.exe 28 PID 1908 wrote to memory of 2252 1908 bombaclat2.exe 28 PID 1908 wrote to memory of 2252 1908 bombaclat2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bombaclat2.exe"C:\Users\Admin\AppData\Local\Temp\bombaclat2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\bombaclat2.exe"C:\Users\Admin\AppData\Local\Temp\bombaclat2.exe"2⤵
- Loads dropped DLL
PID:2252
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\AddSkip.3gpp"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:380
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5b4ddbd37774dfb7e830363e5322eef7a
SHA184586ba617f9c69f710bbe4ea8cdc713f2847fd6
SHA25693cd0bcebb9216923aa65dd367e4d61e96abf4c7ebdcc607d1b98948c6440132
SHA512f725602e613d1305c81273faae2ee5dd0f729faac70228d920596f11bb3e446cfb5cc27a1310151d159b8af544f5eaca12f8d0e988b3de5d3c3516af631e41d1
-
Filesize
21KB
MD53d33809b15e4c5be123af92d077daa50
SHA128d676a1803544fd116cf9af208bece5acef4175
SHA25618f0eff7867ef0f2840c4661958f8c368477d95cf45f6cd4b593d221275dbd3a
SHA5126dbb828caf4dc29c14c8e30e4208b005c96d24260425e552512ab48869f8a7ef95e6d4314428a07c4afaa7594bd67b526109cb25b0fb5785e6fc9610c97c3735
-
Filesize
21KB
MD56b83d4eb10cffd5f2b924d158bf49ac7
SHA1b1739727be764ab9a28ce144afb1ee66b33572a7
SHA256378b3d06d2bac4c1bbed114d12137ebaa8118ae602c97f57f866992617eb20e6
SHA51201e532fb2d604b7fc49a30b1ac9829873399d130433a5c3885e448356b501334d49afffc77d23dccfa731b7a319e930c20db5a7d1f2dbeee9f891582afbd8ca5
-
Filesize
21KB
MD580fd27f237fd1b89e58ac6e0479067ea
SHA171d3af4414d1f134640d98c567fb7c8b3130e4e8
SHA256daacea53ff46a34a84d10aefc9cafa97edd102b60d19a98cf655fcfd4a484d9d
SHA512046efa819565515addb2e9a53fb5964f02ee69dfd67de13c7269718169c49b111557352285967c639dd827bbef86bf65e8a04dca22375b6bc35518d45184d944
-
Filesize
21KB
MD52664cc03c9c88d3012e905b98475e80f
SHA169eefed9612943fb2cb1d8177df18a72dcad03c9
SHA256fba01ae42c54b0abe17633f9e65d72a8374343d5960990b4cdf200abe839a583
SHA51279406164a62c31bf5bad24781d26fbf135dab8570de7caf3bb7b8e3f987d98eb8b8cc07c71860af4a482a4656e6ed018e4d45d6cca5df51ebe7b16d036842a1f
-
Filesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38
-
Filesize
1.1MB
MD555f2308bb0ac1bf91e8bb7f047045b58
SHA19a5f16cd17e44bc05b9d7ac6a6ee24b59126f842
SHA256c29304964f5ad5b0c4050176cf82ee51214e55fe8bea58acf2685b60af4589e8
SHA512ac715bbbf50ff43c28a556ae19d265ff56fff0ba35de91069cef07240af83338b90ea7e994d027a5acafbdd1e0fb6ae1d7288837d3ef9a2b43c7932c8ceb4042
-
Filesize
73B
MD5e4f6c2fda3da90af5e18891e12b7127f
SHA12f53db3a7f57ee45e0cb336b583946b7763a8d96
SHA25610872c86432483eb6e12cfb0071cba0f8a175d9087cd43be5023b0ac71071639
SHA512ccce30ca49326b7a75e2ae41069a0f788b96d941fcf5dc66b5a307d3a6d729899f820dcfaa2e5e3e0a4a7ec3f11266e83866c71377d0988a09888b87b129cd17
-
Filesize
17B
MD5004982d6beee118c169289d03679a6f2
SHA150ec1749a04d5374b382129adc697680e6883722
SHA256fb3f6d0efeb1d0eaafcedd60c75ef56100b1e704e5c8f0a2c48036780190d635
SHA5128f68c135bed592f97d3a1a22f07d7a5e7a3f9ff1f6efb91d431082db52e19d8ed58aa48f63649e4c641ed0446cbfe053e4157eebde91ad70a39f4d5938bc4e25