Analysis

  • max time kernel
    294s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 03:14

General

  • Target

    MfW10_Fix_Repair_UWP_V3_Generic.rar

  • Size

    9.2MB

  • MD5

    9f1ac277b57bc25cb436dcf181132eeb

  • SHA1

    55dca7da8419b79b0afee1955895a3b8a0cfc4ee

  • SHA256

    6a7425c3d954386ff850fe9b1ab5150561aaffbd680a60761f70d2c05d8da980

  • SHA512

    c80034ef1a0c91aa53ce832965ef845c41d515a54cc7dcf83a62314548c7ba9ed2ee8fa06a184e1b5b5fb0948d967a3466f187edad9e3f9190c1b5209fdcb1d3

  • SSDEEP

    196608:7BUkz1gfvBWJELvzUbA8k7zTHmMnVJdVwGUYQGCBr2HY:7BUMgfvBDviknTHmhGUYQrrz

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MfW10_Fix_Repair_UWP_V3_Generic.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MfW10_Fix_Repair_UWP_V3_Generic.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MfW10_Fix_Repair_UWP_V3_Generic.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\MfW10_Fix_Repair_UWP_V3_Generic.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2624-29-0x000000013F540000-0x000000013F638000-memory.dmp

    Filesize

    992KB

  • memory/2624-30-0x000007FEFAE80000-0x000007FEFAEB4000-memory.dmp

    Filesize

    208KB

  • memory/2624-32-0x000007FEFAE60000-0x000007FEFAE78000-memory.dmp

    Filesize

    96KB

  • memory/2624-38-0x000007FEF75D0000-0x000007FEF75E1000-memory.dmp

    Filesize

    68KB

  • memory/2624-37-0x000007FEF75F0000-0x000007FEF760D000-memory.dmp

    Filesize

    116KB

  • memory/2624-36-0x000007FEFA740000-0x000007FEFA751000-memory.dmp

    Filesize

    68KB

  • memory/2624-35-0x000007FEFAE00000-0x000007FEFAE17000-memory.dmp

    Filesize

    92KB

  • memory/2624-34-0x000007FEFAE20000-0x000007FEFAE31000-memory.dmp

    Filesize

    68KB

  • memory/2624-33-0x000007FEFAE40000-0x000007FEFAE57000-memory.dmp

    Filesize

    92KB

  • memory/2624-31-0x000007FEF5940000-0x000007FEF5BF6000-memory.dmp

    Filesize

    2.7MB

  • memory/2624-39-0x000007FEF5600000-0x000007FEF580B000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-46-0x000007FEF6800000-0x000007FEF6811000-memory.dmp

    Filesize

    68KB

  • memory/2624-45-0x000007FEF6820000-0x000007FEF6831000-memory.dmp

    Filesize

    68KB

  • memory/2624-44-0x000007FEF7090000-0x000007FEF70A1000-memory.dmp

    Filesize

    68KB

  • memory/2624-43-0x000007FEF75B0000-0x000007FEF75C8000-memory.dmp

    Filesize

    96KB

  • memory/2624-42-0x000007FEF6840000-0x000007FEF6861000-memory.dmp

    Filesize

    132KB

  • memory/2624-41-0x000007FEF6870000-0x000007FEF68B1000-memory.dmp

    Filesize

    260KB

  • memory/2624-56-0x000007FEF4380000-0x000007FEF43A4000-memory.dmp

    Filesize

    144KB

  • memory/2624-61-0x000007FEF6970000-0x000007FEF6987000-memory.dmp

    Filesize

    92KB

  • memory/2624-60-0x000007FEF42F0000-0x000007FEF4302000-memory.dmp

    Filesize

    72KB

  • memory/2624-59-0x000007FEF4310000-0x000007FEF4321000-memory.dmp

    Filesize

    68KB

  • memory/2624-58-0x000007FEF4330000-0x000007FEF4353000-memory.dmp

    Filesize

    140KB

  • memory/2624-57-0x000007FEF4360000-0x000007FEF4378000-memory.dmp

    Filesize

    96KB

  • memory/2624-55-0x000007FEF43B0000-0x000007FEF43D8000-memory.dmp

    Filesize

    160KB

  • memory/2624-54-0x000007FEF43E0000-0x000007FEF4437000-memory.dmp

    Filesize

    348KB

  • memory/2624-52-0x000007FEF4460000-0x000007FEF44DC000-memory.dmp

    Filesize

    496KB

  • memory/2624-51-0x000007FEF44E0000-0x000007FEF4547000-memory.dmp

    Filesize

    412KB

  • memory/2624-50-0x000007FEF61C0000-0x000007FEF61F0000-memory.dmp

    Filesize

    192KB

  • memory/2624-49-0x000007FEF61F0000-0x000007FEF6208000-memory.dmp

    Filesize

    96KB

  • memory/2624-40-0x000007FEF4550000-0x000007FEF5600000-memory.dmp

    Filesize

    16.7MB

  • memory/2624-53-0x000007FEF4440000-0x000007FEF4451000-memory.dmp

    Filesize

    68KB

  • memory/2624-48-0x000007FEF6210000-0x000007FEF6221000-memory.dmp

    Filesize

    68KB

  • memory/2624-47-0x000007FEF67E0000-0x000007FEF67FB000-memory.dmp

    Filesize

    108KB