Overview
overview
3Static
static
3Hoic.rar
windows7-x64
3Hoic.rar
windows10-2004-x64
3Hoic/DUTCH...OM.txt
windows7-x64
1Hoic/DUTCH...OM.txt
windows10-2004-x64
1Hoic/Dutch...m.hoic
windows7-x64
3Hoic/Dutch...m.hoic
windows10-2004-x64
3Hoic/Gener...t.hoic
windows7-x64
3Hoic/Gener...t.hoic
windows10-2004-x64
3Hoic/butto...ns.rar
windows7-x64
3Hoic/butto...ns.rar
windows10-2004-x64
3buttons/4add.png
windows7-x64
3buttons/4add.png
windows10-2004-x64
3buttons/6266.png
windows7-x64
3buttons/6266.png
windows10-2004-x64
3buttons/666.png
windows7-x64
3buttons/666.png
windows10-2004-x64
3Hoic/butto...dd.png
windows7-x64
3Hoic/butto...dd.png
windows10-2004-x64
3Hoic/butto...66.png
windows7-x64
3Hoic/butto...66.png
windows10-2004-x64
3Hoic/butto...66.png
windows7-x64
3Hoic/butto...66.png
windows10-2004-x64
3Hoic/butto...66.png
windows7-x64
3Hoic/butto...66.png
windows10-2004-x64
3Hoic/butto...mbs.db
windows7-x64
3Hoic/butto...mbs.db
windows10-2004-x64
3Hoic/butto...dd.png
windows7-x64
3Hoic/butto...dd.png
windows10-2004-x64
3Hoic/butto...d2.png
windows7-x64
3Hoic/butto...d2.png
windows10-2004-x64
3Hoic/butto...d3.png
windows7-x64
3Hoic/butto...d3.png
windows10-2004-x64
3Resubmissions
31-07-2024 04:57
240731-flg26axflr 3Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
31-07-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
Hoic.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Hoic.rar
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
Hoic/DUTCH FREEDOM.txt
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Hoic/DUTCH FREEDOM.txt
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
Hoic/DutchFreedom.hoic
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Hoic/DutchFreedom.hoic
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
Hoic/GenericBoost.hoic
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Hoic/GenericBoost.hoic
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
Hoic/buttons2/buttons.rar
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Hoic/buttons2/buttons.rar
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
buttons/4add.png
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
buttons/4add.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
buttons/6266.png
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
buttons/6266.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
buttons/666.png
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
buttons/666.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
Hoic/buttons2/buttons/4add.png
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Hoic/buttons2/buttons/4add.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
Hoic/buttons2/buttons/6266.png
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Hoic/buttons2/buttons/6266.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
Hoic/buttons2/buttons/666.png
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Hoic/buttons2/buttons/666.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
Hoic/buttons2/buttons/6666.png
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Hoic/buttons2/buttons/6666.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
Hoic/buttons2/buttons/Thumbs.db
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Hoic/buttons2/buttons/Thumbs.db
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
Hoic/buttons2/buttons/add.png
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Hoic/buttons2/buttons/add.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
Hoic/buttons2/buttons/add2.png
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Hoic/buttons2/buttons/add2.png
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
Hoic/buttons2/buttons/add3.png
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
Hoic/buttons2/buttons/add3.png
Resource
win10v2004-20240730-en
General
-
Target
Hoic.rar
-
Size
1.7MB
-
MD5
ba60fe26a85d5f5b6338d562930aeff2
-
SHA1
499b6643dd5a7f1dd4d57506041c1207e657bce0
-
SHA256
59e0d15fcdf92551a204c7e71776a88f54ea9df74e2ba2cfb04e7582c04dec81
-
SHA512
2fcc74e1c44ae2a9829d53eb6f7946965ad6f8d88b2ebaf8df223c881b99066c155cc94a3c566cfe08ebfe1eded6615df410ee30dc0c9877aba1c9daa44217ec
-
SSDEEP
49152:YQs04R8oXUEgIRnwN/INLZw8NoibprkwSIdwHQa:zSRYfNANLZw8NLbZudh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2716 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 vlc.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe -
Suspicious use of SendNotifyMessage 57 IoCs
pid Process 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe 2716 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2716 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2340 3016 cmd.exe 31 PID 3016 wrote to memory of 2340 3016 cmd.exe 31 PID 3016 wrote to memory of 2340 3016 cmd.exe 31 PID 2340 wrote to memory of 2832 2340 rundll32.exe 32 PID 2340 wrote to memory of 2832 2340 rundll32.exe 32 PID 2340 wrote to memory of 2832 2340 rundll32.exe 32 PID 2832 wrote to memory of 2716 2832 rundll32.exe 34 PID 2832 wrote to memory of 2716 2832 rundll32.exe 34 PID 2832 wrote to memory of 2716 2832 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Hoic.rar1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hoic.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hoic.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Hoic.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5316d70846c4e0f9603aeacc8e6f9f9d9
SHA1913df646348e3af2e728868016c4da9a36c8644a
SHA2560b00aebd135206e7463ede8392dbd69e0cba41d0027520099ba5185fbadd21a5
SHA5125ce88eb2f7ff7da7a84cf4fa7e23cad16d38d9e77495cb5948b791e58d3c5c7f65f9164aa43f704f94e6d2a4ac6dbbc2bea929421aa475e35f307966b5d98947
-
Filesize
18B
MD5c827a2591780274602f87ff14a28239d
SHA1f55b701fc01c08d2fb83814f5e0c9e2dccc26192
SHA256394cf3c4659d4a38d63d37ba07e1c5b334c72b7bb8d222601a7314f22b9654cf
SHA512355c4fcbcc2f2bcc610182e7a274995255120dff1ad7a93cc77daf343c03572110b715b1e6bf495b9ee33bb97d5e3726ef139f6367680496db3fb8861136751c