Overview
overview
10Static
static
3archive.rar
windows7-x64
3archive.rar
windows10-2004-x64
3amdhip64.dll
windows7-x64
1amdhip64.dll
windows10-2004-x64
1concrt140.dll
windows7-x64
1concrt140.dll
windows10-2004-x64
1res_mods/1..._a.pyc
windows7-x64
3res_mods/1..._a.pyc
windows10-2004-x64
3res_mods/1..._a.xml
windows7-x64
1res_mods/1..._a.xml
windows10-2004-x64
1res_mods/1...me.txt
windows7-x64
1res_mods/1...me.txt
windows10-2004-x64
1res_mods/1...me.txt
windows7-x64
1res_mods/1...me.txt
windows10-2004-x64
1setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10updates/icudtl.dat
windows7-x64
3updates/icudtl.dat
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
archive.rar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
archive.rar
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
amdhip64.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
amdhip64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
concrt140.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
concrt140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.xml
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.xml
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
res_mods/1.24.0.0/readme.txt
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
res_mods/1.24.0.0/readme.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
res_mods/1.25.0.0/readme.txt
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
res_mods/1.25.0.0/readme.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
setup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
updates/icudtl.dat
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
updates/icudtl.dat
Resource
win10v2004-20240611-en
General
-
Target
archive.rar
-
Size
9.7MB
-
MD5
5b61717757e05f71db4397b2b4fae79f
-
SHA1
87ff0f49285e5b268061106e190bdc7a2858ef63
-
SHA256
2f718b6527df6babca62b1c7e0126bf18ad92927ecf9baf433c5f6808befd063
-
SHA512
abb9afc4a963a633e4a627755b2cc32fc0c5c11f09518982144a7a04ffd625be950b81c35b57692142e8a18cae603738d8781d40d94e05bd1d90e53340e4d2fe
-
SSDEEP
196608:pS03aSSqjia+n5raUAb08CpmHiVGeHUQGjrnDFhhOhBojv9s8LgUMXc:pl3zl+/raUVVGSpGfnDFhemj1VLg5M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2616 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 vlc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe 2616 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2616 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2088 2168 cmd.exe 29 PID 2168 wrote to memory of 2088 2168 cmd.exe 29 PID 2168 wrote to memory of 2088 2168 cmd.exe 29 PID 2088 wrote to memory of 2616 2088 rundll32.exe 30 PID 2088 wrote to memory of 2616 2088 rundll32.exe 30 PID 2088 wrote to memory of 2616 2088 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\archive.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\archive.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\archive.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1228