Analysis

  • max time kernel
    52s
  • max time network
    55s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 19:13

General

  • Target

    Karaoke Player.exe

  • Size

    1.4MB

  • MD5

    67af1b28b6f88d0034fbe1d5c6174240

  • SHA1

    10f0e5eb56c4ddd4dbbdc7bb210b619683841d38

  • SHA256

    1d428f44d92b40ccf5d71f0ceeaa1679e10bd9dbf74b5ae7c51d292920bb543a

  • SHA512

    792013a6f5eb67f5cd2c0a608c6897c76d24f2c203995b33bea75fa0c1d69f5abe1b803e28a42d3376de09679d11a9b85e7e4214b52da6a08db0ee992257f15e

  • SSDEEP

    24576:M0T2vebca8z0/YQmrp0T2vebca8z0/HR2j1tIljX842GCnv9uM3kQYYjkub:92ixvYTrg2ixvHRiiX842GCnv8EkQYYx

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Karaoke Player.exe
    "C:\Users\Admin\AppData\Local\Temp\Karaoke Player.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Windows\SysWOW64\Regsvr32.exe
      Regsvr32 /s "C:\Windows\system32\AlphaDIB.dll"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:4452
    • C:\Windows\SysWOW64\Regsvr32.exe
      Regsvr32 /s "C:\Windows\system32\dx7vb.dll"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:2848
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2d4 0x4b0
    1⤵
      PID:4396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Windows\SysWOW64\AlphaDIB.dll

      Filesize

      740KB

      MD5

      08f61aa236190c5ae82ac2025312fc67

      SHA1

      17561c1bc8526a14e19168ac2e72000874250e40

      SHA256

      45d06642016f4037ae707a1ed07546cdfa679ab96b9bb2c808b8c846334a7a88

      SHA512

      057ab52f42c2678cd4597cbd1df39e43809c00420a0086a11d812cf7e7e0f85feb75fe818cf7ce5f70a518589200caa4e2b27b41cb9c8de3ba418e468328c85f

    • C:\Windows\SysWOW64\dx7vb.dll

      Filesize

      604KB

      MD5

      6cae2684d2d48c68b508f494c44a88a3

      SHA1

      f7cd95b1cea79dc5a861cb8a18244b34a1bd0b38

      SHA256

      d8e1d644db690b5169a1deba1697d3fb3a93e2bfbc56c6ff6ed564d5022cd9d6

      SHA512

      d836578e50a54eb05b5bef1fd993cd494432860b3c408c0b099a213d107fa07951aee83ffdd8f782753538a5f7f4f9ac055d96e07fcf27b9fe8cb11a1824d505

    • memory/3724-13-0x0000000008A20000-0x0000000008A83000-memory.dmp

      Filesize

      396KB

    • memory/3724-17-0x0000000008A90000-0x0000000008AB1000-memory.dmp

      Filesize

      132KB

    • memory/3724-21-0x0000000008AC0000-0x0000000008B0B000-memory.dmp

      Filesize

      300KB