Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 21:24

General

  • Target

    CupFixer Replica by .type_shi..rar

  • Size

    147.7MB

  • MD5

    2ee65ed6aff91c18bbfc91094a9aa7dc

  • SHA1

    9b3bb7c6464f843519098bfe6100239ad18012f0

  • SHA256

    086c622c79e43fc2d0801824a09f588d68716ec9f8731f99ee1a0dd44641c29c

  • SHA512

    fba12046c30f5e0b6c066a231c8dd57f155c4bf77b5e792251fb5a9af164a92dd60eb4b17cf79f800fe08ffeb8d0985538d14acfa76186e863149d03c55f4879

  • SSDEEP

    3145728:IiBVCD9TSgIlO1zW/WXb5KIY9UaQhTcFYmueVaFsmy6/FPb:IMmdVIlJWrgjQhqDaamZb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\CupFixer Replica by .type_shi..rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CupFixer Replica by .type_shi..rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CupFixer Replica by .type_shi..rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\CupFixer Replica by .type_shi..rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:332
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x54c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/332-30-0x000007FEFAB00000-0x000007FEFAB34000-memory.dmp

    Filesize

    208KB

  • memory/332-29-0x000000013F300000-0x000000013F3F8000-memory.dmp

    Filesize

    992KB

  • memory/332-32-0x000007FEFAE80000-0x000007FEFAE98000-memory.dmp

    Filesize

    96KB

  • memory/332-34-0x000007FEFAAC0000-0x000007FEFAAD1000-memory.dmp

    Filesize

    68KB

  • memory/332-35-0x000007FEFAAA0000-0x000007FEFAAB7000-memory.dmp

    Filesize

    92KB

  • memory/332-33-0x000007FEFAAE0000-0x000007FEFAAF7000-memory.dmp

    Filesize

    92KB

  • memory/332-36-0x000007FEFAA80000-0x000007FEFAA91000-memory.dmp

    Filesize

    68KB

  • memory/332-37-0x000007FEFA6B0000-0x000007FEFA6CD000-memory.dmp

    Filesize

    116KB

  • memory/332-38-0x000007FEF6AA0000-0x000007FEF6AB1000-memory.dmp

    Filesize

    68KB

  • memory/332-31-0x000007FEF5C80000-0x000007FEF5F36000-memory.dmp

    Filesize

    2.7MB

  • memory/332-40-0x000007FEF4630000-0x000007FEF483B000-memory.dmp

    Filesize

    2.0MB

  • memory/332-43-0x000007FEF6A00000-0x000007FEF6A18000-memory.dmp

    Filesize

    96KB

  • memory/332-45-0x000007FEF6530000-0x000007FEF6541000-memory.dmp

    Filesize

    68KB

  • memory/332-46-0x000007FEF6510000-0x000007FEF6521000-memory.dmp

    Filesize

    68KB

  • memory/332-47-0x000007FEF64F0000-0x000007FEF650B000-memory.dmp

    Filesize

    108KB

  • memory/332-41-0x000007FEF6A50000-0x000007FEF6A91000-memory.dmp

    Filesize

    260KB

  • memory/332-42-0x000007FEF6A20000-0x000007FEF6A41000-memory.dmp

    Filesize

    132KB

  • memory/332-44-0x000007FEF6550000-0x000007FEF6561000-memory.dmp

    Filesize

    68KB

  • memory/332-50-0x000007FEF6310000-0x000007FEF6340000-memory.dmp

    Filesize

    192KB

  • memory/332-64-0x000007FEEFCE0000-0x000007FEEFCF6000-memory.dmp

    Filesize

    88KB

  • memory/332-63-0x000007FEEFD00000-0x000007FEEFD11000-memory.dmp

    Filesize

    68KB

  • memory/332-62-0x000007FEF1550000-0x000007FEF157F000-memory.dmp

    Filesize

    188KB

  • memory/332-61-0x000007FEFAA70000-0x000007FEFAA80000-memory.dmp

    Filesize

    64KB

  • memory/332-60-0x000007FEF43D0000-0x000007FEF43E2000-memory.dmp

    Filesize

    72KB

  • memory/332-59-0x000007FEF43F0000-0x000007FEF4401000-memory.dmp

    Filesize

    68KB

  • memory/332-58-0x000007FEF4410000-0x000007FEF4433000-memory.dmp

    Filesize

    140KB

  • memory/332-65-0x000007FEEFC10000-0x000007FEEFCD5000-memory.dmp

    Filesize

    788KB

  • memory/332-66-0x000007FEEFA30000-0x000007FEEFA72000-memory.dmp

    Filesize

    264KB

  • memory/332-57-0x000007FEF4440000-0x000007FEF4458000-memory.dmp

    Filesize

    96KB

  • memory/332-56-0x000007FEF4460000-0x000007FEF4484000-memory.dmp

    Filesize

    144KB

  • memory/332-67-0x000007FEEF520000-0x000007FEEF582000-memory.dmp

    Filesize

    392KB

  • memory/332-55-0x000007FEF4490000-0x000007FEF44B8000-memory.dmp

    Filesize

    160KB

  • memory/332-54-0x000007FEF44C0000-0x000007FEF4517000-memory.dmp

    Filesize

    348KB

  • memory/332-53-0x000007FEF4520000-0x000007FEF4531000-memory.dmp

    Filesize

    68KB

  • memory/332-52-0x000007FEF4540000-0x000007FEF45BC000-memory.dmp

    Filesize

    496KB

  • memory/332-68-0x000007FEEF4B0000-0x000007FEEF51D000-memory.dmp

    Filesize

    436KB

  • memory/332-51-0x000007FEF45C0000-0x000007FEF4627000-memory.dmp

    Filesize

    412KB

  • memory/332-49-0x000007FEF6340000-0x000007FEF6358000-memory.dmp

    Filesize

    96KB

  • memory/332-48-0x000007FEF6360000-0x000007FEF6371000-memory.dmp

    Filesize

    68KB

  • memory/332-39-0x000007FEF4840000-0x000007FEF58F0000-memory.dmp

    Filesize

    16.7MB