Resubmissions

31-07-2024 04:57

240731-flg26axflr 3

Analysis

  • max time kernel
    144s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2024 04:57

General

  • Target

    Hoic/buttons2/buttons.rar

  • Size

    59KB

  • MD5

    7d7495cdeb9b52f12d32460027782d0d

  • SHA1

    08c5ff013f5d0469a941bc3e3bc5446270d3f3ba

  • SHA256

    99344a350f7f78dee7b1e31d018a53ffc8b574271a78b35c0f8abfa2f804bd9a

  • SHA512

    b36a9f3b6cfd0c2c09901cefdca82d56bcc7727da4fa98c81877b341c187a4f54d7a3a282201f39cf3a6f2eccd5fd78921c476f9268c31612579d876a30c3f4b

  • SSDEEP

    768:p357+O35A351rJJ+35BA35J35Q+H35Zg35zbKD35hG35UD35k35hZPl635mjL35l:qNJ8SOQEPl5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Hoic\buttons2\buttons.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hoic\buttons2\buttons.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hoic\buttons2\buttons.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Hoic\buttons2\buttons.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/360-25-0x000007FEF65A0000-0x000007FEF65D4000-memory.dmp

    Filesize

    208KB

  • memory/360-24-0x000000013FA50000-0x000000013FB48000-memory.dmp

    Filesize

    992KB

  • memory/360-27-0x000007FEF5AA0000-0x000007FEF5AB8000-memory.dmp

    Filesize

    96KB

  • memory/360-31-0x000007FEF5A20000-0x000007FEF5A31000-memory.dmp

    Filesize

    68KB

  • memory/360-32-0x000007FEF5A00000-0x000007FEF5A1D000-memory.dmp

    Filesize

    116KB

  • memory/360-30-0x000007FEF5A40000-0x000007FEF5A57000-memory.dmp

    Filesize

    92KB

  • memory/360-29-0x000007FEF5A60000-0x000007FEF5A71000-memory.dmp

    Filesize

    68KB

  • memory/360-28-0x000007FEF5A80000-0x000007FEF5A97000-memory.dmp

    Filesize

    92KB

  • memory/360-26-0x000007FEF5BF0000-0x000007FEF5EA6000-memory.dmp

    Filesize

    2.7MB

  • memory/360-33-0x000007FEF59E0000-0x000007FEF59F1000-memory.dmp

    Filesize

    68KB

  • memory/360-34-0x000007FEF57D0000-0x000007FEF59DB000-memory.dmp

    Filesize

    2.0MB

  • memory/360-39-0x000007FEF77C0000-0x000007FEF77D1000-memory.dmp

    Filesize

    68KB

  • memory/360-38-0x000007FEF77E0000-0x000007FEF77F8000-memory.dmp

    Filesize

    96KB

  • memory/360-37-0x000007FEF7800000-0x000007FEF7821000-memory.dmp

    Filesize

    132KB

  • memory/360-36-0x000007FEF7830000-0x000007FEF7871000-memory.dmp

    Filesize

    260KB

  • memory/360-45-0x000007FEF4580000-0x000007FEF45B0000-memory.dmp

    Filesize

    192KB

  • memory/360-35-0x000007FEF4720000-0x000007FEF57D0000-memory.dmp

    Filesize

    16.7MB

  • memory/360-57-0x000007FEF42D0000-0x000007FEF42E3000-memory.dmp

    Filesize

    76KB

  • memory/360-56-0x000007FEF42F0000-0x000007FEF4311000-memory.dmp

    Filesize

    132KB

  • memory/360-55-0x000007FEF4320000-0x000007FEF4332000-memory.dmp

    Filesize

    72KB

  • memory/360-54-0x000007FEF4340000-0x000007FEF4351000-memory.dmp

    Filesize

    68KB

  • memory/360-53-0x000007FEF4360000-0x000007FEF4383000-memory.dmp

    Filesize

    140KB

  • memory/360-52-0x000007FEF4390000-0x000007FEF43A8000-memory.dmp

    Filesize

    96KB

  • memory/360-50-0x000007FEF43E0000-0x000007FEF4408000-memory.dmp

    Filesize

    160KB

  • memory/360-49-0x000007FEF4410000-0x000007FEF4467000-memory.dmp

    Filesize

    348KB

  • memory/360-48-0x000007FEF4470000-0x000007FEF4481000-memory.dmp

    Filesize

    68KB

  • memory/360-47-0x000007FEF4490000-0x000007FEF450C000-memory.dmp

    Filesize

    496KB

  • memory/360-46-0x000007FEF4510000-0x000007FEF4577000-memory.dmp

    Filesize

    412KB

  • memory/360-44-0x000007FEF45B0000-0x000007FEF45C8000-memory.dmp

    Filesize

    96KB

  • memory/360-43-0x000007FEF45D0000-0x000007FEF45E1000-memory.dmp

    Filesize

    68KB

  • memory/360-42-0x000007FEF45F0000-0x000007FEF460B000-memory.dmp

    Filesize

    108KB

  • memory/360-41-0x000007FEF4610000-0x000007FEF4621000-memory.dmp

    Filesize

    68KB

  • memory/360-40-0x000007FEF4630000-0x000007FEF4641000-memory.dmp

    Filesize

    68KB

  • memory/360-51-0x000007FEF43B0000-0x000007FEF43D4000-memory.dmp

    Filesize

    144KB