Resubmissions

12/07/2024, 12:41

240712-pwx1sswdkg 3

12/07/2024, 12:35

240712-psl45awcja 7

Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 12:41

General

  • Target

    DC - Unlocker 2 Client 1.00.1374 [Full _ 2017].rar

  • Size

    4.6MB

  • MD5

    b34e0d270857d0eb025f4f637013b8ea

  • SHA1

    09978dda0e241d9b4a774a91e7f3ceb4b9dddbad

  • SHA256

    9da934614b12c5ede86e9b6a75e23930fe5ff75bf68ce4635d631e292307a1fd

  • SHA512

    e0661d531c3f07f52b47a0f5d78b86f8c8e25cd179e852126de81ab094d222eca79439a134a01e75332cb8fd68bf14c2429a223bcf489112631abadaee8ab103

  • SSDEEP

    98304:g9rp1/IXZfcQbe4iwMZ9o8pEx2Eb+PC2KHKis+Yik+d1E3ERWyP:gp/A5iw+9o8p3SMKHKiq+dO3EIi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\DC - Unlocker 2 Client 1.00.1374 [Full _ 2017].rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DC - Unlocker 2 Client 1.00.1374 [Full _ 2017].rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DC - Unlocker 2 Client 1.00.1374 [Full _ 2017].rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\DC - Unlocker 2 Client 1.00.1374 [Full _ 2017].rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2688-30-0x000007FEF7550000-0x000007FEF7584000-memory.dmp

    Filesize

    208KB

  • memory/2688-29-0x000000013F670000-0x000000013F768000-memory.dmp

    Filesize

    992KB

  • memory/2688-34-0x000007FEF72D0000-0x000007FEF72E1000-memory.dmp

    Filesize

    68KB

  • memory/2688-35-0x000007FEF72B0000-0x000007FEF72C7000-memory.dmp

    Filesize

    92KB

  • memory/2688-33-0x000007FEF72F0000-0x000007FEF7307000-memory.dmp

    Filesize

    92KB

  • memory/2688-32-0x000007FEFAC80000-0x000007FEFAC98000-memory.dmp

    Filesize

    96KB

  • memory/2688-36-0x000007FEF6D60000-0x000007FEF6D71000-memory.dmp

    Filesize

    68KB

  • memory/2688-38-0x000007FEF6D20000-0x000007FEF6D31000-memory.dmp

    Filesize

    68KB

  • memory/2688-37-0x000007FEF6D40000-0x000007FEF6D5D000-memory.dmp

    Filesize

    116KB

  • memory/2688-31-0x000007FEF5DA0000-0x000007FEF6056000-memory.dmp

    Filesize

    2.7MB

  • memory/2688-39-0x000007FEF5B90000-0x000007FEF5D9B000-memory.dmp

    Filesize

    2.0MB

  • memory/2688-44-0x000007FEF5B70000-0x000007FEF5B81000-memory.dmp

    Filesize

    68KB

  • memory/2688-47-0x000007FEF5B10000-0x000007FEF5B2B000-memory.dmp

    Filesize

    108KB

  • memory/2688-46-0x000007FEF5B30000-0x000007FEF5B41000-memory.dmp

    Filesize

    68KB

  • memory/2688-45-0x000007FEF5B50000-0x000007FEF5B61000-memory.dmp

    Filesize

    68KB

  • memory/2688-42-0x000007FEF6CF0000-0x000007FEF6D11000-memory.dmp

    Filesize

    132KB

  • memory/2688-41-0x000007FEF66C0000-0x000007FEF6701000-memory.dmp

    Filesize

    260KB

  • memory/2688-48-0x000007FEF5AF0000-0x000007FEF5B01000-memory.dmp

    Filesize

    68KB

  • memory/2688-43-0x000007FEF66A0000-0x000007FEF66B8000-memory.dmp

    Filesize

    96KB

  • memory/2688-49-0x000007FEF5AD0000-0x000007FEF5AE8000-memory.dmp

    Filesize

    96KB

  • memory/2688-51-0x000007FEF5A30000-0x000007FEF5A97000-memory.dmp

    Filesize

    412KB

  • memory/2688-53-0x000007FEF5990000-0x000007FEF59A1000-memory.dmp

    Filesize

    68KB

  • memory/2688-52-0x000007FEF59B0000-0x000007FEF5A2C000-memory.dmp

    Filesize

    496KB

  • memory/2688-50-0x000007FEF5AA0000-0x000007FEF5AD0000-memory.dmp

    Filesize

    192KB

  • memory/2688-54-0x000007FEF5930000-0x000007FEF5987000-memory.dmp

    Filesize

    348KB

  • memory/2688-55-0x000007FEF5900000-0x000007FEF5928000-memory.dmp

    Filesize

    160KB

  • memory/2688-56-0x000007FEF58D0000-0x000007FEF58F4000-memory.dmp

    Filesize

    144KB

  • memory/2688-57-0x000007FEF58B0000-0x000007FEF58C8000-memory.dmp

    Filesize

    96KB

  • memory/2688-60-0x000007FEF5840000-0x000007FEF5852000-memory.dmp

    Filesize

    72KB

  • memory/2688-59-0x000007FEF5860000-0x000007FEF5871000-memory.dmp

    Filesize

    68KB

  • memory/2688-58-0x000007FEF5880000-0x000007FEF58A3000-memory.dmp

    Filesize

    140KB

  • memory/2688-40-0x000007FEF4300000-0x000007FEF53B0000-memory.dmp

    Filesize

    16.7MB