Resubmissions

25/06/2024, 01:37

240625-b151baxamn 8

25/06/2024, 01:35

240625-bzvsystckh 7

Analysis

  • max time kernel
    300s
  • max time network
    191s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/06/2024, 01:35

General

  • Target

    Data/Soundtrack/14. GGZ2.ogg

  • Size

    4.4MB

  • MD5

    83d9183db7a4d97ad77e2ba0ad05f75d

  • SHA1

    8102879747cbc5fdeb333ccdf873b097aabc8bc3

  • SHA256

    cf39fe929879e68d97932811a8feccf5241c1cdc34bd57b3bfe666489a3c9922

  • SHA512

    30816d7b89d9f8a4304c0cda825f86b386ca6812e5496c5130039b982369dd93223ee5f08436b104d656fa8b0b3dc8b45e2795cc77961ea0a998c52a10a8d76b

  • SSDEEP

    98304:zTTJnpRtwin1WTjPvik5u5wcCzX3MWS0A86EOxm:zTdnVwbRcCzXn/A86Hm

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Data\Soundtrack\14. GGZ2.ogg"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3952
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x320
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3952-8-0x00007FFDD7410000-0x00007FFDD7444000-memory.dmp

    Filesize

    208KB

  • memory/3952-7-0x00007FF6AA4C0000-0x00007FF6AA5B8000-memory.dmp

    Filesize

    992KB

  • memory/3952-16-0x00007FFDD7030000-0x00007FFDD7041000-memory.dmp

    Filesize

    68KB

  • memory/3952-15-0x00007FFDD7050000-0x00007FFDD706D000-memory.dmp

    Filesize

    116KB

  • memory/3952-9-0x00007FFDD6330000-0x00007FFDD65E6000-memory.dmp

    Filesize

    2.7MB

  • memory/3952-17-0x00007FFDD5F70000-0x00007FFDD617B000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-18-0x00007FFDD6FE0000-0x00007FFDD7021000-memory.dmp

    Filesize

    260KB

  • memory/3952-14-0x00007FFDD7390000-0x00007FFDD73A1000-memory.dmp

    Filesize

    68KB

  • memory/3952-13-0x00007FFDD73B0000-0x00007FFDD73C7000-memory.dmp

    Filesize

    92KB

  • memory/3952-12-0x00007FFDD73D0000-0x00007FFDD73E1000-memory.dmp

    Filesize

    68KB

  • memory/3952-11-0x00007FFDD73F0000-0x00007FFDD7407000-memory.dmp

    Filesize

    92KB

  • memory/3952-10-0x00007FFDDB530000-0x00007FFDDB548000-memory.dmp

    Filesize

    96KB

  • memory/3952-25-0x00007FFDD6F10000-0x00007FFDD6F2B000-memory.dmp

    Filesize

    108KB

  • memory/3952-24-0x00007FFDD6F30000-0x00007FFDD6F41000-memory.dmp

    Filesize

    68KB

  • memory/3952-23-0x00007FFDD6F50000-0x00007FFDD6F61000-memory.dmp

    Filesize

    68KB

  • memory/3952-22-0x00007FFDD6F70000-0x00007FFDD6F81000-memory.dmp

    Filesize

    68KB

  • memory/3952-21-0x00007FFDD6F90000-0x00007FFDD6FA8000-memory.dmp

    Filesize

    96KB

  • memory/3952-20-0x00007FFDD6FB0000-0x00007FFDD6FD1000-memory.dmp

    Filesize

    132KB

  • memory/3952-19-0x00007FFDC7330000-0x00007FFDC83E0000-memory.dmp

    Filesize

    16.7MB