Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 19:12

General

  • Target

    #!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔.rar

  • Size

    7.3MB

  • MD5

    35ce302fca95659f94eeba853e82f35d

  • SHA1

    57bb1d0c8e0fa4ebed115f58eacba45ba0c8bfa5

  • SHA256

    dde89429b7848f78895f03595567c9a17816f33d2bd0cab08f157f41da5b116a

  • SHA512

    67c7260afbe85d18e571c213e2ba2de302158ed96eabcac53670cf8a4fe540e504cc1e20d2c7dca0f7cdbe07756b219459b78aa50e38e9947c88eb99e794cb6c

  • SSDEEP

    196608:X/skCfkcAK7XtOoGc1Jfa8RU9107C9MOKTcmBsrO9dtFRF8:xC8cnXHpU4+9MPBsrO9Vw

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1144-30-0x000007FEF7FD0000-0x000007FEF8004000-memory.dmp

    Filesize

    208KB

  • memory/1144-29-0x000000013F810000-0x000000013F908000-memory.dmp

    Filesize

    992KB

  • memory/1144-32-0x000007FEF7E80000-0x000007FEF7E98000-memory.dmp

    Filesize

    96KB

  • memory/1144-33-0x000007FEF7E60000-0x000007FEF7E77000-memory.dmp

    Filesize

    92KB

  • memory/1144-38-0x000007FEF78C0000-0x000007FEF78D1000-memory.dmp

    Filesize

    68KB

  • memory/1144-37-0x000007FEF78E0000-0x000007FEF78FD000-memory.dmp

    Filesize

    116KB

  • memory/1144-36-0x000007FEF7900000-0x000007FEF7911000-memory.dmp

    Filesize

    68KB

  • memory/1144-35-0x000007FEF7E20000-0x000007FEF7E37000-memory.dmp

    Filesize

    92KB

  • memory/1144-34-0x000007FEF7E40000-0x000007FEF7E51000-memory.dmp

    Filesize

    68KB

  • memory/1144-31-0x000007FEF6B00000-0x000007FEF6DB6000-memory.dmp

    Filesize

    2.7MB

  • memory/1144-39-0x000007FEF68F0000-0x000007FEF6AFB000-memory.dmp

    Filesize

    2.0MB

  • memory/1144-41-0x000007FEF7870000-0x000007FEF78B1000-memory.dmp

    Filesize

    260KB

  • memory/1144-44-0x000007FEF7400000-0x000007FEF7411000-memory.dmp

    Filesize

    68KB

  • memory/1144-53-0x000007FEF72A0000-0x000007FEF72B1000-memory.dmp

    Filesize

    68KB

  • memory/1144-61-0x000007FEF80C0000-0x000007FEF80D7000-memory.dmp

    Filesize

    92KB

  • memory/1144-60-0x000007FEF6780000-0x000007FEF6792000-memory.dmp

    Filesize

    72KB

  • memory/1144-59-0x000007FEF67A0000-0x000007FEF67B1000-memory.dmp

    Filesize

    68KB

  • memory/1144-58-0x000007FEF67C0000-0x000007FEF67E3000-memory.dmp

    Filesize

    140KB

  • memory/1144-57-0x000007FEF67F0000-0x000007FEF6808000-memory.dmp

    Filesize

    96KB

  • memory/1144-56-0x000007FEF6810000-0x000007FEF6834000-memory.dmp

    Filesize

    144KB

  • memory/1144-55-0x000007FEF6840000-0x000007FEF6868000-memory.dmp

    Filesize

    160KB

  • memory/1144-54-0x000007FEF6E10000-0x000007FEF6E67000-memory.dmp

    Filesize

    348KB

  • memory/1144-52-0x000007FEF6870000-0x000007FEF68EC000-memory.dmp

    Filesize

    496KB

  • memory/1144-51-0x000007FEF72C0000-0x000007FEF7327000-memory.dmp

    Filesize

    412KB

  • memory/1144-50-0x000007FEF7330000-0x000007FEF7360000-memory.dmp

    Filesize

    192KB

  • memory/1144-49-0x000007FEF7360000-0x000007FEF7378000-memory.dmp

    Filesize

    96KB

  • memory/1144-48-0x000007FEF7380000-0x000007FEF7391000-memory.dmp

    Filesize

    68KB

  • memory/1144-47-0x000007FEF73A0000-0x000007FEF73BB000-memory.dmp

    Filesize

    108KB

  • memory/1144-46-0x000007FEF73C0000-0x000007FEF73D1000-memory.dmp

    Filesize

    68KB

  • memory/1144-45-0x000007FEF73E0000-0x000007FEF73F1000-memory.dmp

    Filesize

    68KB

  • memory/1144-43-0x000007FEF7850000-0x000007FEF7868000-memory.dmp

    Filesize

    96KB

  • memory/1144-42-0x000007FEF7420000-0x000007FEF7441000-memory.dmp

    Filesize

    132KB

  • memory/1144-40-0x000007FEF5180000-0x000007FEF6230000-memory.dmp

    Filesize

    16.7MB