Analysis

  • max time kernel
    143s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 08:41

General

  • Target

    Unconfirmed 934267.rar

  • Size

    9.9MB

  • MD5

    002776078299e34b29c37ab5f9920988

  • SHA1

    e5f42165541a7895f5f2880088ffed9ca98fca76

  • SHA256

    6625184dba4dae6c2af097b2636785dff42d90f4a40ba26472c0ebd691a133a6

  • SHA512

    e927c9af0f7a7649ec94dcd7b1579d7258f2c8f34357ea58be58302eba7dc5937581d81143762b89ecc74f9057cb3feb4172c64662cb8005878fd79679ebd84f

  • SSDEEP

    196608:wzjlfML2YHS2r3YbqNySoGoZUYp9faWUGtwrwMDyFHpYsaOXHo4:w/m2Yy2r3qqYDZvwDyTDXR

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Unconfirmed 934267.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Unconfirmed 934267.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Unconfirmed 934267.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Unconfirmed 934267.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-29-0x000000013F560000-0x000000013F658000-memory.dmp

    Filesize

    992KB

  • memory/2344-30-0x000007FEF78B0000-0x000007FEF78E4000-memory.dmp

    Filesize

    208KB

  • memory/2344-32-0x000007FEFABA0000-0x000007FEFABB8000-memory.dmp

    Filesize

    96KB

  • memory/2344-34-0x000007FEF7870000-0x000007FEF7881000-memory.dmp

    Filesize

    68KB

  • memory/2344-35-0x000007FEF7850000-0x000007FEF7867000-memory.dmp

    Filesize

    92KB

  • memory/2344-31-0x000007FEF63C0000-0x000007FEF6676000-memory.dmp

    Filesize

    2.7MB

  • memory/2344-33-0x000007FEF7890000-0x000007FEF78A7000-memory.dmp

    Filesize

    92KB

  • memory/2344-36-0x000007FEF7830000-0x000007FEF7841000-memory.dmp

    Filesize

    68KB

  • memory/2344-37-0x000007FEF7810000-0x000007FEF782D000-memory.dmp

    Filesize

    116KB

  • memory/2344-38-0x000007FEF77F0000-0x000007FEF7801000-memory.dmp

    Filesize

    68KB

  • memory/2344-41-0x000007FEF6B80000-0x000007FEF6BC1000-memory.dmp

    Filesize

    260KB

  • memory/2344-40-0x000007FEF4FD0000-0x000007FEF51DB000-memory.dmp

    Filesize

    2.0MB

  • memory/2344-46-0x000007FEF66F0000-0x000007FEF6701000-memory.dmp

    Filesize

    68KB

  • memory/2344-45-0x000007FEF6710000-0x000007FEF6721000-memory.dmp

    Filesize

    68KB

  • memory/2344-44-0x000007FEF6B60000-0x000007FEF6B71000-memory.dmp

    Filesize

    68KB

  • memory/2344-39-0x000007FEF51E0000-0x000007FEF6290000-memory.dmp

    Filesize

    16.7MB

  • memory/2344-43-0x000007FEF76E0000-0x000007FEF76F8000-memory.dmp

    Filesize

    96KB

  • memory/2344-42-0x000007FEF7120000-0x000007FEF7141000-memory.dmp

    Filesize

    132KB

  • memory/2344-47-0x000007FEF66D0000-0x000007FEF66EB000-memory.dmp

    Filesize

    108KB

  • memory/2344-48-0x000007FEF4FB0000-0x000007FEF4FC1000-memory.dmp

    Filesize

    68KB

  • memory/2344-49-0x000007FEF4F90000-0x000007FEF4FA8000-memory.dmp

    Filesize

    96KB

  • memory/2344-50-0x000007FEF4F60000-0x000007FEF4F90000-memory.dmp

    Filesize

    192KB

  • memory/2344-51-0x000007FEF4EF0000-0x000007FEF4F57000-memory.dmp

    Filesize

    412KB

  • memory/2344-52-0x000007FEF4E70000-0x000007FEF4EEC000-memory.dmp

    Filesize

    496KB

  • memory/2344-53-0x000007FEF4E50000-0x000007FEF4E61000-memory.dmp

    Filesize

    68KB

  • memory/2344-54-0x000007FEF4DF0000-0x000007FEF4E47000-memory.dmp

    Filesize

    348KB

  • memory/2344-55-0x000007FEF4DC0000-0x000007FEF4DE8000-memory.dmp

    Filesize

    160KB

  • memory/2344-56-0x000007FEF4D90000-0x000007FEF4DB4000-memory.dmp

    Filesize

    144KB

  • memory/2344-60-0x000007FEF4D00000-0x000007FEF4D12000-memory.dmp

    Filesize

    72KB

  • memory/2344-59-0x000007FEF4D20000-0x000007FEF4D31000-memory.dmp

    Filesize

    68KB

  • memory/2344-58-0x000007FEF4D40000-0x000007FEF4D63000-memory.dmp

    Filesize

    140KB

  • memory/2344-57-0x000007FEF4D70000-0x000007FEF4D88000-memory.dmp

    Filesize

    96KB

  • memory/2344-61-0x000007FEF3BB0000-0x000007FEF3BC1000-memory.dmp

    Filesize

    68KB

  • memory/2344-62-0x000007FEF3B70000-0x000007FEF3B81000-memory.dmp

    Filesize

    68KB