Analysis

  • max time kernel
    291s
  • max time network
    282s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-07-2024 10:48

General

  • Target

    $PLUGINSDIR/dat_bgm.ogg

  • Size

    165KB

  • MD5

    f484a5db943fbefe894146a109513ff9

  • SHA1

    3097181ce18c30933da3566d77b6beea5c9092ca

  • SHA256

    ddae02d386f23c8d03792d06beb5100f1d230fa6c9c66b007fa5a3808e5dedaf

  • SHA512

    634615101e5ccef3fbd6bb9fdac881808f231eccb79bd135dd804251b4d564cc89c7a14fe2fe548e7345a6437383edb8fb00ba19666834e4aeaced2103f3ff6d

  • SSDEEP

    3072:tpbseuX0bbGvARsR9Eq9TBECn066ZCtALQOcCL3qFf4vklt/9Rs5BK2KAfnVGsGB:E7XXAc9NEmwmOb3qFztwBK2KAf2/KvT8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dat_bgm.ogg
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dat_bgm.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1268
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004D0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:6096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1268-6-0x00007FFA62D60000-0x00007FFA62D94000-memory.dmp

    Filesize

    208KB

  • memory/1268-5-0x00007FF6BBEE0000-0x00007FF6BBFD8000-memory.dmp

    Filesize

    992KB

  • memory/1268-18-0x00007FFA5E2E0000-0x00007FFA5E2F8000-memory.dmp

    Filesize

    96KB

  • memory/1268-7-0x00007FFA4D380000-0x00007FFA4D636000-memory.dmp

    Filesize

    2.7MB

  • memory/1268-16-0x00007FFA5E330000-0x00007FFA5E371000-memory.dmp

    Filesize

    260KB

  • memory/1268-15-0x00007FFA5E380000-0x00007FFA5E391000-memory.dmp

    Filesize

    68KB

  • memory/1268-14-0x00007FFA4CF40000-0x00007FFA4D14B000-memory.dmp

    Filesize

    2.0MB

  • memory/1268-30-0x00007FFA4D740000-0x00007FFA4D79C000-memory.dmp

    Filesize

    368KB

  • memory/1268-13-0x00007FFA5E3A0000-0x00007FFA5E3BD000-memory.dmp

    Filesize

    116KB

  • memory/1268-12-0x00007FFA5ED00000-0x00007FFA5ED11000-memory.dmp

    Filesize

    68KB

  • memory/1268-11-0x00007FFA5F0A0000-0x00007FFA5F0B7000-memory.dmp

    Filesize

    92KB

  • memory/1268-10-0x00007FFA5F150000-0x00007FFA5F161000-memory.dmp

    Filesize

    68KB

  • memory/1268-9-0x00007FFA63CA0000-0x00007FFA63CB7000-memory.dmp

    Filesize

    92KB

  • memory/1268-8-0x00007FFA63E10000-0x00007FFA63E28000-memory.dmp

    Filesize

    96KB

  • memory/1268-29-0x00007FFA533C0000-0x00007FFA533D1000-memory.dmp

    Filesize

    68KB

  • memory/1268-28-0x00007FFA53250000-0x00007FFA532CC000-memory.dmp

    Filesize

    496KB

  • memory/1268-27-0x00007FFA532D0000-0x00007FFA53337000-memory.dmp

    Filesize

    412KB

  • memory/1268-19-0x00007FFA4BE90000-0x00007FFA4CF40000-memory.dmp

    Filesize

    16.7MB

  • memory/1268-26-0x00007FFA544B0000-0x00007FFA544E0000-memory.dmp

    Filesize

    192KB

  • memory/1268-25-0x00007FFA5E030000-0x00007FFA5E048000-memory.dmp

    Filesize

    96KB

  • memory/1268-24-0x00007FFA5E0A0000-0x00007FFA5E0B1000-memory.dmp

    Filesize

    68KB

  • memory/1268-23-0x00007FFA5E0C0000-0x00007FFA5E0DB000-memory.dmp

    Filesize

    108KB

  • memory/1268-22-0x00007FFA5E0E0000-0x00007FFA5E0F1000-memory.dmp

    Filesize

    68KB

  • memory/1268-21-0x00007FFA5E190000-0x00007FFA5E1A1000-memory.dmp

    Filesize

    68KB

  • memory/1268-20-0x00007FFA5E1B0000-0x00007FFA5E1C1000-memory.dmp

    Filesize

    68KB

  • memory/1268-17-0x00007FFA5E300000-0x00007FFA5E321000-memory.dmp

    Filesize

    132KB