Overview
overview
9Static
static
3NY TOOLS/B...er.exe
windows7-x64
NY TOOLS/B...er.exe
windows10-2004-x64
DefCon/DefCon.rar
windows7-x64
3DefCon/DefCon.rar
windows10-2004-x64
3DefCon/Def...gs.vbs
windows7-x64
1DefCon/Def...gs.vbs
windows10-2004-x64
1DefCon/ReadMe.txt
windows7-x64
1DefCon/ReadMe.txt
windows10-2004-x64
1UNLOCKER V2.exe
windows7-x64
5UNLOCKER V2.exe
windows10-2004-x64
5bsod fix.bat
windows7-x64
1bsod fix.bat
windows10-2004-x64
1w11 fix.bat
windows7-x64
9w11 fix.bat
windows10-2004-x64
9UNLOCK ALL.exe
windows7-x64
9UNLOCK ALL.exe
windows10-2004-x64
9bsod fix.bat
windows7-x64
1bsod fix.bat
windows10-2004-x64
1w11 fix.bat
windows7-x64
9w11 fix.bat
windows10-2004-x64
9VIP-CHAIR.exe
windows7-x64
5VIP-CHAIR.exe
windows10-2004-x64
5bsod fix.bat
windows7-x64
1bsod fix.bat
windows10-2004-x64
1w11 fix.bat
windows7-x64
9w11 fix.bat
windows10-2004-x64
9Analysis
-
max time kernel
143s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:04
Static task
static1
Behavioral task
behavioral1
Sample
NY TOOLS/BLOCKER&WOOFER/Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NY TOOLS/BLOCKER&WOOFER/Loader.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
DefCon/DefCon.rar
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
DefCon/DefCon.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
DefCon/Defender_Settings.vbs
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
DefCon/Defender_Settings.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
DefCon/ReadMe.txt
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
DefCon/ReadMe.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
UNLOCKER V2.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
UNLOCKER V2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
bsod fix.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
bsod fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
w11 fix.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
w11 fix.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
UNLOCK ALL.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
UNLOCK ALL.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
bsod fix.bat
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
bsod fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
w11 fix.bat
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
w11 fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
VIP-CHAIR.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
VIP-CHAIR.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
bsod fix.bat
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
bsod fix.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
w11 fix.bat
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
w11 fix.bat
Resource
win10v2004-20240426-en
General
-
Target
DefCon/DefCon.rar
-
Size
445KB
-
MD5
b46af7fc448e6fc31b4ef838e0235521
-
SHA1
c5ba1edefa2241c721aa1fea589a81216315bc14
-
SHA256
7e7c628c578afce5abbe1ba80d0d156857949766efa787c0ed307065e14909a6
-
SHA512
8cbf17d8adf989d4de022493e7634186b751271aaf5922e4d77dde58136d00a60eab0753849e14537ecdb20d3683f01c9b449fd723712323240a00a22faca2a1
-
SSDEEP
12288:aI7rMU6047sT0LdFObmFVfAWeIJ8qZa125+BMr:zX60GsGlfeYc+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 3004 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 3004 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
vlc.exepid process 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
vlc.exepid process 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe 3004 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 3004 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 2364 wrote to memory of 2752 2364 cmd.exe rundll32.exe PID 2364 wrote to memory of 2752 2364 cmd.exe rundll32.exe PID 2364 wrote to memory of 2752 2364 cmd.exe rundll32.exe PID 2752 wrote to memory of 2748 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2748 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2748 2752 rundll32.exe rundll32.exe PID 2748 wrote to memory of 3004 2748 rundll32.exe vlc.exe PID 2748 wrote to memory of 3004 2748 rundll32.exe vlc.exe PID 2748 wrote to memory of 3004 2748 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DefCon\DefCon.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DefCon\DefCon.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DefCon\DefCon.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\DefCon\DefCon.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3004