Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 11:21

General

  • Target

    CipherWare Spoofer 04-29.rar

  • Size

    11.4MB

  • MD5

    353b77804e6ee0c1282787dbd8a99874

  • SHA1

    ddb2d691e9691b92f15534f0f975f67a1a787ee2

  • SHA256

    9f0930c6ccac8f9a6a58b056ce2cfa25da6a4c61ce6bdb31d80b963e911e0adf

  • SHA512

    a19b7f24f91f735110d37378006364c2acd6d36330dc0e8c47fd3f1f3e24abc4f423d4c928ac5018fa850b4723d75dfdd7d8d67989289a6338242bf51f6f2867

  • SSDEEP

    196608:VUROe2gz2r4PGL4kyuE4oeFP5wZ4XG67nmxSwPJ2MfoFhAr5DK18LKuD157wb:W2gze4uL4zG3w+znwRhobArN7Bab

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\CipherWare Spoofer 04-29.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CipherWare Spoofer 04-29.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\CipherWare Spoofer 04-29.rar"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2652-30-0x000007FEF7540000-0x000007FEF7574000-memory.dmp

    Filesize

    208KB

  • memory/2652-29-0x000000013F060000-0x000000013F158000-memory.dmp

    Filesize

    992KB

  • memory/2652-32-0x000007FEFB170000-0x000007FEFB188000-memory.dmp

    Filesize

    96KB

  • memory/2652-33-0x000007FEF7500000-0x000007FEF7517000-memory.dmp

    Filesize

    92KB

  • memory/2652-34-0x000007FEF6FC0000-0x000007FEF6FD1000-memory.dmp

    Filesize

    68KB

  • memory/2652-35-0x000007FEF6FA0000-0x000007FEF6FB7000-memory.dmp

    Filesize

    92KB

  • memory/2652-38-0x000007FEF6F40000-0x000007FEF6F51000-memory.dmp

    Filesize

    68KB

  • memory/2652-37-0x000007FEF6F60000-0x000007FEF6F7D000-memory.dmp

    Filesize

    116KB

  • memory/2652-36-0x000007FEF6F80000-0x000007FEF6F91000-memory.dmp

    Filesize

    68KB

  • memory/2652-31-0x000007FEF5D60000-0x000007FEF6014000-memory.dmp

    Filesize

    2.7MB

  • memory/2652-39-0x000007FEF5B60000-0x000007FEF5D60000-memory.dmp

    Filesize

    2.0MB

  • memory/2652-46-0x000007FEF6440000-0x000007FEF6451000-memory.dmp

    Filesize

    68KB

  • memory/2652-41-0x000007FEF6930000-0x000007FEF696F000-memory.dmp

    Filesize

    252KB

  • memory/2652-42-0x000007FEF6900000-0x000007FEF6921000-memory.dmp

    Filesize

    132KB

  • memory/2652-43-0x000007FEF68E0000-0x000007FEF68F8000-memory.dmp

    Filesize

    96KB

  • memory/2652-45-0x000007FEF6460000-0x000007FEF6471000-memory.dmp

    Filesize

    68KB

  • memory/2652-47-0x000007FEF6420000-0x000007FEF643B000-memory.dmp

    Filesize

    108KB

  • memory/2652-50-0x000007FEF63B0000-0x000007FEF63E0000-memory.dmp

    Filesize

    192KB

  • memory/2652-52-0x000007FEF49D0000-0x000007FEF4A3F000-memory.dmp

    Filesize

    444KB

  • memory/2652-61-0x000007FEF3E20000-0x000007FEF3E31000-memory.dmp

    Filesize

    68KB

  • memory/2652-60-0x000007FEF4880000-0x000007FEF4892000-memory.dmp

    Filesize

    72KB

  • memory/2652-62-0x000007FEF3D10000-0x000007FEF3E12000-memory.dmp

    Filesize

    1.0MB

  • memory/2652-59-0x000007FEF48A0000-0x000007FEF48B1000-memory.dmp

    Filesize

    68KB

  • memory/2652-58-0x000007FEF48C0000-0x000007FEF48E3000-memory.dmp

    Filesize

    140KB

  • memory/2652-57-0x000007FEF48F0000-0x000007FEF4907000-memory.dmp

    Filesize

    92KB

  • memory/2652-56-0x000007FEF4910000-0x000007FEF4934000-memory.dmp

    Filesize

    144KB

  • memory/2652-55-0x000007FEF4940000-0x000007FEF4968000-memory.dmp

    Filesize

    160KB

  • memory/2652-54-0x000007FEF4970000-0x000007FEF49C6000-memory.dmp

    Filesize

    344KB

  • memory/2652-53-0x000007FEF6390000-0x000007FEF63A1000-memory.dmp

    Filesize

    68KB

  • memory/2652-51-0x000007FEF4A40000-0x000007FEF4AA7000-memory.dmp

    Filesize

    412KB

  • memory/2652-49-0x000007FEF63E0000-0x000007FEF63F8000-memory.dmp

    Filesize

    96KB

  • memory/2652-48-0x000007FEF6400000-0x000007FEF6411000-memory.dmp

    Filesize

    68KB

  • memory/2652-44-0x000007FEF6480000-0x000007FEF6491000-memory.dmp

    Filesize

    68KB

  • memory/2652-40-0x000007FEF4AB0000-0x000007FEF5B5B000-memory.dmp

    Filesize

    16.7MB