Analysis

  • max time kernel
    52s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/06/2024, 16:39

General

  • Target

    python-MidiToVirtualPianoMacro-master/bach.mid

  • Size

    12KB

  • MD5

    f7ab9716a5e6f1ee971d0e788c58c5cb

  • SHA1

    7759b99a471715ba00d5d68f72c7b83d47a25d29

  • SHA256

    107f2b6a298f283f8d26d4e8359669e7780f7ea64011b7844f2ed066d874a37e

  • SHA512

    90a7045902692069baa70867e7bd2e7776ea924a71e8e8288362f469fbc2cb1ad4a6e34cef0e6c92ae6c98cd174a661a79fd6e6d46f52b0a8626af261d2dc74a

  • SSDEEP

    384:eyeRbc2H1ACD1tVawMF8oIgf9fEq2GSquooweqo:5Abc2b1tYw5o3fdEMgx

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\python-MidiToVirtualPianoMacro-master\bach.mid"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4556-6-0x00007FFB33470000-0x00007FFB334A4000-memory.dmp

    Filesize

    208KB

  • memory/4556-5-0x00007FF65E2A0000-0x00007FF65E398000-memory.dmp

    Filesize

    992KB

  • memory/4556-9-0x00007FFB37A80000-0x00007FFB37A97000-memory.dmp

    Filesize

    92KB

  • memory/4556-13-0x00007FFB32F80000-0x00007FFB32F9D000-memory.dmp

    Filesize

    116KB

  • memory/4556-11-0x00007FFB33370000-0x00007FFB33387000-memory.dmp

    Filesize

    92KB

  • memory/4556-15-0x00007FFB243D0000-0x00007FFB245DB000-memory.dmp

    Filesize

    2.0MB

  • memory/4556-12-0x00007FFB33350000-0x00007FFB33361000-memory.dmp

    Filesize

    68KB

  • memory/4556-10-0x00007FFB37610000-0x00007FFB37621000-memory.dmp

    Filesize

    68KB

  • memory/4556-7-0x00007FFB24830000-0x00007FFB24AE6000-memory.dmp

    Filesize

    2.7MB

  • memory/4556-14-0x00007FFB32F60000-0x00007FFB32F71000-memory.dmp

    Filesize

    68KB

  • memory/4556-23-0x00007FFB22B50000-0x00007FFB22B67000-memory.dmp

    Filesize

    92KB

  • memory/4556-22-0x00007FFB32D80000-0x00007FFB32D91000-memory.dmp

    Filesize

    68KB

  • memory/4556-21-0x00007FFB32DA0000-0x00007FFB32DB1000-memory.dmp

    Filesize

    68KB

  • memory/4556-20-0x00007FFB32DC0000-0x00007FFB32DD1000-memory.dmp

    Filesize

    68KB

  • memory/4556-19-0x00007FFB32EF0000-0x00007FFB32F08000-memory.dmp

    Filesize

    96KB

  • memory/4556-18-0x00007FFB32E30000-0x00007FFB32E51000-memory.dmp

    Filesize

    132KB

  • memory/4556-17-0x00007FFB32F10000-0x00007FFB32F51000-memory.dmp

    Filesize

    260KB

  • memory/4556-8-0x00007FFB38A50000-0x00007FFB38A68000-memory.dmp

    Filesize

    96KB

  • memory/4556-16-0x00007FFB23320000-0x00007FFB243D0000-memory.dmp

    Filesize

    16.7MB

  • memory/4556-54-0x00007FFB23320000-0x00007FFB243D0000-memory.dmp

    Filesize

    16.7MB