Analysis
-
max time kernel
44s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
1v1.lol_Subz.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1v1.lol_Subz.rar
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
subz 1v1.lol/1v1.lol.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
subz 1v1.lol/1v1.lol.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
subz 1v1.lol/subz.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
subz 1v1.lol/subz.exe
Resource
win10v2004-20240709-en
General
-
Target
1v1.lol_Subz.rar
-
Size
257KB
-
MD5
646c0bcce5a1cbba02e12555e4ba0c3f
-
SHA1
406d1e749f77b331c0c5cbc4977002c89704dd8b
-
SHA256
11879aaf810fdacf73f694015e4b75ab1c68be8eb372b76f1c03d8b21d0dc1b7
-
SHA512
16953b0c223f258e8d4e00628d3f018a665eab36708092cc8a5dfbdc5ec821de2d719f04489ff595459e9c50cb3dda66ab4bdb69eab570ef88c1205c12b52012
-
SSDEEP
6144:wi8zD7uZ30sTaWbUBHTWWapGp3RdVJaEgLU1XG:sH6Z30sTaWQBzEMzdVNgLU12
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2564 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe 2564 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2564 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2072 1584 cmd.exe 31 PID 1584 wrote to memory of 2072 1584 cmd.exe 31 PID 1584 wrote to memory of 2072 1584 cmd.exe 31 PID 2072 wrote to memory of 2744 2072 rundll32.exe 33 PID 2072 wrote to memory of 2744 2072 rundll32.exe 33 PID 2072 wrote to memory of 2744 2072 rundll32.exe 33 PID 2744 wrote to memory of 2564 2744 rundll32.exe 35 PID 2744 wrote to memory of 2564 2744 rundll32.exe 35 PID 2744 wrote to memory of 2564 2744 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1v1.lol_Subz.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1v1.lol_Subz.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1v1.lol_Subz.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\1v1.lol_Subz.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
-