Analysis

  • max time kernel
    144s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 21:36

General

  • Target

    Borat.rar

  • Size

    9.6MB

  • MD5

    e3b10d235c365ac49d6855df0432bb76

  • SHA1

    4ce182c19796cf8d4c017fdd8fd4b390de1eac7e

  • SHA256

    53cdc49c7fb83b419c07edb45c544b106aaa37db00e8a37211678af6350a82f1

  • SHA512

    bb91a4bf979516c2a19733772b4c34b09b45efbcec491f2fb62adde9222e6306ce32a17de3e6f9b3d7338a93f3d72e4747a23157675663f00e9f153bc4ec4704

  • SSDEEP

    196608:XrmtNiLocMQin2MKY9U6Qw9w/ZpX4ff5c4lgg0:7mt5tn2y9Woff5c4G

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Borat.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Borat.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Borat.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Borat.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1768-29-0x000000013F490000-0x000000013F588000-memory.dmp

    Filesize

    992KB

  • memory/1768-30-0x000007FEFAD00000-0x000007FEFAD34000-memory.dmp

    Filesize

    208KB

  • memory/1768-32-0x000007FEFACE0000-0x000007FEFACF8000-memory.dmp

    Filesize

    96KB

  • memory/1768-33-0x000007FEFACC0000-0x000007FEFACD7000-memory.dmp

    Filesize

    92KB

  • memory/1768-35-0x000007FEFAC80000-0x000007FEFAC97000-memory.dmp

    Filesize

    92KB

  • memory/1768-34-0x000007FEFACA0000-0x000007FEFACB1000-memory.dmp

    Filesize

    68KB

  • memory/1768-36-0x000007FEFABE0000-0x000007FEFABF1000-memory.dmp

    Filesize

    68KB

  • memory/1768-38-0x000007FEFABA0000-0x000007FEFABB1000-memory.dmp

    Filesize

    68KB

  • memory/1768-37-0x000007FEFABC0000-0x000007FEFABDD000-memory.dmp

    Filesize

    116KB

  • memory/1768-31-0x000007FEF6130000-0x000007FEF63E6000-memory.dmp

    Filesize

    2.7MB

  • memory/1768-39-0x000007FEF5D70000-0x000007FEF5F7B000-memory.dmp

    Filesize

    2.0MB

  • memory/1768-41-0x000007FEF4870000-0x000007FEF48B1000-memory.dmp

    Filesize

    260KB

  • memory/1768-44-0x000007FEF6520000-0x000007FEF6531000-memory.dmp

    Filesize

    68KB

  • memory/1768-48-0x000007FEF4830000-0x000007FEF4841000-memory.dmp

    Filesize

    68KB

  • memory/1768-50-0x000007FEF47E0000-0x000007FEF4810000-memory.dmp

    Filesize

    192KB

  • memory/1768-51-0x000007FEF4770000-0x000007FEF47D7000-memory.dmp

    Filesize

    412KB

  • memory/1768-49-0x000007FEF4810000-0x000007FEF4828000-memory.dmp

    Filesize

    96KB

  • memory/1768-43-0x000007FEF6BA0000-0x000007FEF6BB8000-memory.dmp

    Filesize

    96KB

  • memory/1768-42-0x000007FEFAB70000-0x000007FEFAB91000-memory.dmp

    Filesize

    132KB

  • memory/1768-47-0x000007FEF4850000-0x000007FEF486B000-memory.dmp

    Filesize

    108KB

  • memory/1768-63-0x000007FEF2E80000-0x000007FEF2E91000-memory.dmp

    Filesize

    68KB

  • memory/1768-62-0x000007FEF3C10000-0x000007FEF3C23000-memory.dmp

    Filesize

    76KB

  • memory/1768-61-0x000007FEF3E30000-0x000007FEF3E51000-memory.dmp

    Filesize

    132KB

  • memory/1768-60-0x000007FEF3E60000-0x000007FEF3E72000-memory.dmp

    Filesize

    72KB

  • memory/1768-59-0x000007FEF4370000-0x000007FEF4381000-memory.dmp

    Filesize

    68KB

  • memory/1768-58-0x000007FEF4390000-0x000007FEF43B3000-memory.dmp

    Filesize

    140KB

  • memory/1768-64-0x000007FEF2E20000-0x000007FEF2E77000-memory.dmp

    Filesize

    348KB

  • memory/1768-57-0x000007FEF43C0000-0x000007FEF43D8000-memory.dmp

    Filesize

    96KB

  • memory/1768-65-0x000007FEF2DF0000-0x000007FEF2E1F000-memory.dmp

    Filesize

    188KB

  • memory/1768-66-0x000007FEF2DD0000-0x000007FEF2DE3000-memory.dmp

    Filesize

    76KB

  • memory/1768-67-0x000007FEF2DB0000-0x000007FEF2DC1000-memory.dmp

    Filesize

    68KB

  • memory/1768-56-0x000007FEF43E0000-0x000007FEF4404000-memory.dmp

    Filesize

    144KB

  • memory/1768-55-0x000007FEF45D0000-0x000007FEF45F8000-memory.dmp

    Filesize

    160KB

  • memory/1768-54-0x000007FEF4670000-0x000007FEF46C7000-memory.dmp

    Filesize

    348KB

  • memory/1768-53-0x000007FEF46D0000-0x000007FEF46E1000-memory.dmp

    Filesize

    68KB

  • memory/1768-52-0x000007FEF46F0000-0x000007FEF476C000-memory.dmp

    Filesize

    496KB

  • memory/1768-40-0x000007FEF4CC0000-0x000007FEF5D70000-memory.dmp

    Filesize

    16.7MB

  • memory/1768-46-0x000007FEF60F0000-0x000007FEF6101000-memory.dmp

    Filesize

    68KB

  • memory/1768-45-0x000007FEF6110000-0x000007FEF6121000-memory.dmp

    Filesize

    68KB

  • memory/1768-69-0x000007FEF2CC0000-0x000007FEF2CD3000-memory.dmp

    Filesize

    76KB

  • memory/1768-68-0x000007FEF2CE0000-0x000007FEF2DA5000-memory.dmp

    Filesize

    788KB

  • memory/1768-70-0x000007FEF2CA0000-0x000007FEF2CB1000-memory.dmp

    Filesize

    68KB

  • memory/1768-71-0x000007FEF2B10000-0x000007FEF2B26000-memory.dmp

    Filesize

    88KB

  • memory/1768-72-0x000007FEF2AF0000-0x000007FEF2B01000-memory.dmp

    Filesize

    68KB

  • memory/1768-73-0x000007FEF2AD0000-0x000007FEF2AE2000-memory.dmp

    Filesize

    72KB

  • memory/1768-74-0x000007FEFB470000-0x000007FEFB480000-memory.dmp

    Filesize

    64KB

  • memory/1768-75-0x000007FEF2AB0000-0x000007FEF2AC6000-memory.dmp

    Filesize

    88KB