Resubmissions
01-06-2024 08:05
240601-jy18caff67 801-06-2024 08:03
240601-jx7czaff42 701-06-2024 07:58
240601-jtsqeaef8z 801-06-2024 07:56
240601-js4raafd97 3Analysis
-
max time kernel
37s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
NordVPN.Premium.v6.28.8.0.rar
Resource
win10v2004-20240426-en
windows10-2004-x64
6 signatures
300 seconds
General
-
Target
NordVPN.Premium.v6.28.8.0.rar
-
Size
9.3MB
-
MD5
f4085f75427f70d0f4146897ebe83231
-
SHA1
96f9d772b1a6f76c5a4c2004f00f0ba2c1b3d773
-
SHA256
c83331dadeb3b573fb6ba0d0f12472b068683904462b14c220f110f213531277
-
SHA512
255f6ab5c7389b51ae0c98d8c3c647c5d9f22d8de15e1475b3ff7707c476182ca4850730c4c46e70bec55e04902d8c444e37378dcbf8d6fbff1bfa3903f5bb85
-
SSDEEP
196608:/e1vM2uCOFaF2Cbq6uxbFkVuAJWjXmrDOmX05zqzhhRZGSzpz:MkNCdF2fhWVuAJWLmr905gN5
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4420 OpenWith.exe 2724 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2724 7zFM.exe Token: 35 2724 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 7zFM.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe 4420 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NordVPN.Premium.v6.28.8.0.rar1⤵
- Modifies registry class
PID:1320
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4420
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2724
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4776