Analysis
-
max time kernel
46s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
Bank Details-Confirmation.rar
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Bank Details-Confirmation.rar
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Bank Details-Confirmation.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Bank Details-Confirmation.exe
Resource
win10v2004-20240508-en
General
-
Target
Bank Details-Confirmation.rar
-
Size
710KB
-
MD5
31ddaceaa727a70d541e2a595e87afc4
-
SHA1
0c12d4aed6652b46f59f8ae401da98a5e9cfa270
-
SHA256
dc9a9a17ee3574f2daed0b37136599b6cc608a83692b252123668e8fd853f29e
-
SHA512
3757301bf860d8c9bee84d998973f8bee4a0220de33709084f2e34f12290792f8be32e4c04faba1968ee4deb6be5d8a8e2a7d0a679826037ed916bccd21edd55
-
SSDEEP
12288:mgzJLX9C2OWCLSCGw0UXzExgv2gnZqMokWRtJG0Ly4usyeILdJP:mgzJLNCZRLSVSDeFgncMu00LfuhjP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2632 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe 2632 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2632 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3016 1216 cmd.exe 29 PID 1216 wrote to memory of 3016 1216 cmd.exe 29 PID 1216 wrote to memory of 3016 1216 cmd.exe 29 PID 3016 wrote to memory of 2676 3016 rundll32.exe 30 PID 3016 wrote to memory of 2676 3016 rundll32.exe 30 PID 3016 wrote to memory of 2676 3016 rundll32.exe 30 PID 2676 wrote to memory of 2632 2676 rundll32.exe 32 PID 2676 wrote to memory of 2632 2676 rundll32.exe 32 PID 2676 wrote to memory of 2632 2676 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Bank Details-Confirmation.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Bank Details-Confirmation.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Bank Details-Confirmation.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Bank Details-Confirmation.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
-