Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 16:31

General

  • Target

    Solicitar lista 04062024 66785000.rar

  • Size

    539KB

  • MD5

    1e675bfa93cdcb75beecc6cb8bea3deb

  • SHA1

    ce27f652186ed25971a29d7bbba74f782c3224e1

  • SHA256

    02c5409b4b4bf99f4b7c5822302a9431bca9ce4b4d67050ba0a6be00c9823347

  • SHA512

    b5288d0128f62e96b61ab9c35b73cf696f302ea18eccce973553effed778861ec3166fa3da617d303ec9def9a9f6373b29c27c841094c41f41fc03f20a461c9b

  • SSDEEP

    12288:7rBoF/oa6Xh0uhG5l2GB3ktHzSSoaJ+6jLy1wkNTOH8kRa:7rk/o/Xh095l2uUtmS1Ywk4FRa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Solicitar lista 04062024 66785000.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2440-24-0x000000013F0F0000-0x000000013F1E8000-memory.dmp

          Filesize

          992KB

        • memory/2440-25-0x000007FEFAEA0000-0x000007FEFAED4000-memory.dmp

          Filesize

          208KB

        • memory/2440-27-0x000007FEFAE80000-0x000007FEFAE98000-memory.dmp

          Filesize

          96KB

        • memory/2440-31-0x000007FEF7910000-0x000007FEF7921000-memory.dmp

          Filesize

          68KB

        • memory/2440-33-0x000007FEF6C60000-0x000007FEF6C71000-memory.dmp

          Filesize

          68KB

        • memory/2440-32-0x000007FEF78F0000-0x000007FEF790D000-memory.dmp

          Filesize

          116KB

        • memory/2440-30-0x000007FEFAE20000-0x000007FEFAE37000-memory.dmp

          Filesize

          92KB

        • memory/2440-29-0x000007FEFAE40000-0x000007FEFAE51000-memory.dmp

          Filesize

          68KB

        • memory/2440-26-0x000007FEF5F30000-0x000007FEF61E6000-memory.dmp

          Filesize

          2.7MB

        • memory/2440-28-0x000007FEFAE60000-0x000007FEFAE77000-memory.dmp

          Filesize

          92KB

        • memory/2440-34-0x000007FEF5BF0000-0x000007FEF5DFB000-memory.dmp

          Filesize

          2.0MB

        • memory/2440-36-0x000007FEF6C10000-0x000007FEF6C51000-memory.dmp

          Filesize

          260KB

        • memory/2440-37-0x000007FEF6BE0000-0x000007FEF6C01000-memory.dmp

          Filesize

          132KB

        • memory/2440-38-0x000007FEF6BC0000-0x000007FEF6BD8000-memory.dmp

          Filesize

          96KB

        • memory/2440-42-0x000007FEF6630000-0x000007FEF664B000-memory.dmp

          Filesize

          108KB

        • memory/2440-50-0x000007FEF6570000-0x000007FEF6598000-memory.dmp

          Filesize

          160KB

        • memory/2440-39-0x000007FEF6710000-0x000007FEF6721000-memory.dmp

          Filesize

          68KB

        • memory/2440-40-0x000007FEF66F0000-0x000007FEF6701000-memory.dmp

          Filesize

          68KB

        • memory/2440-41-0x000007FEF6650000-0x000007FEF6661000-memory.dmp

          Filesize

          68KB

        • memory/2440-56-0x000007FEF1F50000-0x000007FEF1F67000-memory.dmp

          Filesize

          92KB

        • memory/2440-43-0x000007FEF6610000-0x000007FEF6621000-memory.dmp

          Filesize

          68KB

        • memory/2440-44-0x000007FEF65F0000-0x000007FEF6608000-memory.dmp

          Filesize

          96KB

        • memory/2440-55-0x000007FEF59E0000-0x000007FEF59F2000-memory.dmp

          Filesize

          72KB

        • memory/2440-35-0x000007FEF4560000-0x000007FEF5610000-memory.dmp

          Filesize

          16.7MB

        • memory/2440-54-0x000007FEF5A00000-0x000007FEF5A11000-memory.dmp

          Filesize

          68KB

        • memory/2440-53-0x000007FEF5A20000-0x000007FEF5A43000-memory.dmp

          Filesize

          140KB

        • memory/2440-52-0x000007FEF5A50000-0x000007FEF5A68000-memory.dmp

          Filesize

          96KB

        • memory/2440-51-0x000007FEF5A70000-0x000007FEF5A94000-memory.dmp

          Filesize

          144KB

        • memory/2440-49-0x000007FEF5AA0000-0x000007FEF5AF7000-memory.dmp

          Filesize

          348KB

        • memory/2440-48-0x000007FEF65A0000-0x000007FEF65B1000-memory.dmp

          Filesize

          68KB

        • memory/2440-47-0x000007FEF5B00000-0x000007FEF5B7C000-memory.dmp

          Filesize

          496KB

        • memory/2440-46-0x000007FEF5B80000-0x000007FEF5BE7000-memory.dmp

          Filesize

          412KB

        • memory/2440-45-0x000007FEF65C0000-0x000007FEF65F0000-memory.dmp

          Filesize

          192KB