Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 04:21

General

  • Target

    corruptedmodz_rat.rar

  • Size

    19KB

  • MD5

    682dd444e32d545fde8aac4ef34cb851

  • SHA1

    71326c2cfa046b736e1f56dd6c9a110e63079c69

  • SHA256

    66621a34a0482c2cd3d90ac3b702c5dd9bbef332927e2f5f2d374a2f80a151f5

  • SHA512

    dea532aaeaae71617730babc6bf865da2cb7162059e1dae6bd4d70dcd7e40d994be5b3c49a018325ed742f35ed63fc316680880fc0606c2a713e981068ea0c79

  • SSDEEP

    384:KEoI1DrzguMDOvweY4Yo0uBI1J6XYwjyozVfeB14FuJJY:K8muMDAY4Yo5IDhwjyQVmfJY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\corruptedmodz_rat.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\corruptedmodz_rat.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\corruptedmodz_rat.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\corruptedmodz_rat.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2420-32-0x000007FEFB480000-0x000007FEFB4B4000-memory.dmp

    Filesize

    208KB

  • memory/2420-31-0x000000013FA80000-0x000000013FB78000-memory.dmp

    Filesize

    992KB

  • memory/2420-34-0x000007FEFB460000-0x000007FEFB478000-memory.dmp

    Filesize

    96KB

  • memory/2420-35-0x000007FEFB440000-0x000007FEFB457000-memory.dmp

    Filesize

    92KB

  • memory/2420-36-0x000007FEFB420000-0x000007FEFB431000-memory.dmp

    Filesize

    68KB

  • memory/2420-37-0x000007FEFB400000-0x000007FEFB417000-memory.dmp

    Filesize

    92KB

  • memory/2420-38-0x000007FEF80C0000-0x000007FEF80D1000-memory.dmp

    Filesize

    68KB

  • memory/2420-39-0x000007FEF80A0000-0x000007FEF80BD000-memory.dmp

    Filesize

    116KB

  • memory/2420-40-0x000007FEF8080000-0x000007FEF8091000-memory.dmp

    Filesize

    68KB

  • memory/2420-33-0x000007FEF66B0000-0x000007FEF6966000-memory.dmp

    Filesize

    2.7MB

  • memory/2420-41-0x000007FEF6220000-0x000007FEF642B000-memory.dmp

    Filesize

    2.0MB

  • memory/2420-43-0x000007FEF7240000-0x000007FEF7281000-memory.dmp

    Filesize

    260KB

  • memory/2420-44-0x000007FEF7DF0000-0x000007FEF7E11000-memory.dmp

    Filesize

    132KB

  • memory/2420-46-0x000007FEF7220000-0x000007FEF7231000-memory.dmp

    Filesize

    68KB

  • memory/2420-47-0x000007FEF7200000-0x000007FEF7211000-memory.dmp

    Filesize

    68KB

  • memory/2420-45-0x000007FEF73F0000-0x000007FEF7408000-memory.dmp

    Filesize

    96KB

  • memory/2420-48-0x000007FEF71E0000-0x000007FEF71F1000-memory.dmp

    Filesize

    68KB

  • memory/2420-49-0x000007FEF71C0000-0x000007FEF71DB000-memory.dmp

    Filesize

    108KB

  • memory/2420-50-0x000007FEF6DD0000-0x000007FEF6DE1000-memory.dmp

    Filesize

    68KB

  • memory/2420-51-0x000007FEF6DB0000-0x000007FEF6DC8000-memory.dmp

    Filesize

    96KB

  • memory/2420-52-0x000007FEF6D80000-0x000007FEF6DB0000-memory.dmp

    Filesize

    192KB

  • memory/2420-54-0x000007FEF61A0000-0x000007FEF621C000-memory.dmp

    Filesize

    496KB

  • memory/2420-53-0x000007FEF6D10000-0x000007FEF6D77000-memory.dmp

    Filesize

    412KB

  • memory/2420-56-0x000007FEF6140000-0x000007FEF6197000-memory.dmp

    Filesize

    348KB

  • memory/2420-58-0x000007FEF60E0000-0x000007FEF6104000-memory.dmp

    Filesize

    144KB

  • memory/2420-57-0x000007FEF6110000-0x000007FEF6138000-memory.dmp

    Filesize

    160KB

  • memory/2420-55-0x000007FEF6CF0000-0x000007FEF6D01000-memory.dmp

    Filesize

    68KB

  • memory/2420-42-0x000007FEF4A90000-0x000007FEF5B40000-memory.dmp

    Filesize

    16.7MB

  • memory/2420-59-0x000007FEF60C0000-0x000007FEF60D8000-memory.dmp

    Filesize

    96KB

  • memory/2420-60-0x000007FEF6090000-0x000007FEF60B3000-memory.dmp

    Filesize

    140KB

  • memory/2420-61-0x000007FEF6070000-0x000007FEF6081000-memory.dmp

    Filesize

    68KB

  • memory/2420-62-0x000007FEF6050000-0x000007FEF6062000-memory.dmp

    Filesize

    72KB

  • memory/2420-63-0x000007FEF4150000-0x000007FEF4161000-memory.dmp

    Filesize

    68KB

  • memory/2420-64-0x000007FEF4050000-0x000007FEF414F000-memory.dmp

    Filesize

    1020KB