Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
Solicitar lista 04062024 66785000.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Solicitar lista 04062024 66785000.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Solicitar lista 04062024 66785000.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Solicitar lista 04062024 66785000.exe
Resource
win10v2004-20240426-en
General
-
Target
Solicitar lista 04062024 66785000.rar
-
Size
539KB
-
MD5
1e675bfa93cdcb75beecc6cb8bea3deb
-
SHA1
ce27f652186ed25971a29d7bbba74f782c3224e1
-
SHA256
02c5409b4b4bf99f4b7c5822302a9431bca9ce4b4d67050ba0a6be00c9823347
-
SHA512
b5288d0128f62e96b61ab9c35b73cf696f302ea18eccce973553effed778861ec3166fa3da617d303ec9def9a9f6373b29c27c841094c41f41fc03f20a461c9b
-
SSDEEP
12288:7rBoF/oa6Xh0uhG5l2GB3ktHzSSoaJ+6jLy1wkNTOH8kRa:7rk/o/Xh095l2uUtmS1Ywk4FRa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2440 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2440 vlc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2440 vlc.exe 2440 vlc.exe 2440 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2440 vlc.exe 2440 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2440 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2128 1576 cmd.exe 29 PID 1576 wrote to memory of 2128 1576 cmd.exe 29 PID 1576 wrote to memory of 2128 1576 cmd.exe 29 PID 2128 wrote to memory of 2264 2128 rundll32.exe 30 PID 2128 wrote to memory of 2264 2128 rundll32.exe 30 PID 2128 wrote to memory of 2264 2128 rundll32.exe 30 PID 2264 wrote to memory of 2440 2264 rundll32.exe 32 PID 2264 wrote to memory of 2440 2264 rundll32.exe 32 PID 2264 wrote to memory of 2440 2264 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
-