Analysis
-
max time kernel
584s -
max time network
328s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 12:21
Behavioral task
behavioral1
Sample
4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
MathType_v7.x_Patch.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
MathType_v7.x_Patch.exe
Resource
win10v2004-20240709-en
General
-
Target
4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954.rar
-
Size
44.3MB
-
MD5
7bdf359eac471db62f6fffd101c04dcb
-
SHA1
9cb62be2cdfd7a2d14058fdc77faaa02ae9aeaf8
-
SHA256
4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954
-
SHA512
d337a8e3b871121d64f740f9dacf35391f19d99d78648f797e2a4be5385009a2969deb2a858e199cac6345dd2d73525a776d83054586be333ad7bc44f7f2ea1b
-
SSDEEP
786432:G8vXblKLt6r2e70My/ofPAk5e13fY5DUrMo72ACTtyQFyhDmC5eZKI5J9R:G8fcMr7Hlgk5e1vKqMo72ACTYQMhRwh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 3056 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 3056 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
vlc.exepid process 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe 3056 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 3056 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 2780 wrote to memory of 1888 2780 cmd.exe rundll32.exe PID 2780 wrote to memory of 1888 2780 cmd.exe rundll32.exe PID 2780 wrote to memory of 1888 2780 cmd.exe rundll32.exe PID 1888 wrote to memory of 2732 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 2732 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 2732 1888 rundll32.exe rundll32.exe PID 2732 wrote to memory of 3056 2732 rundll32.exe vlc.exe PID 2732 wrote to memory of 3056 2732 rundll32.exe vlc.exe PID 2732 wrote to memory of 3056 2732 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\4e184577b879335e1a8fdda6ff7e87bc2bdade1b6ed6432b3957b181c20ae954.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3056