Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
S500_RAT.rar
Resource
win7-20240708-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
S500_RAT.rar
Resource
win10v2004-20240730-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
S500_RAT.rar
-
Size
30.6MB
-
MD5
c9de9409af7b5f904ae7cbb49e4cb78a
-
SHA1
3f0a3069efb4b9a4d1c15500718dc2e8bb3cb28b
-
SHA256
549529ce2fa6690e1ec94dc522927054c8a9fdcceaf562fe80ef8d82238acc9c
-
SHA512
ba0a05efbd90b0353840b5170a5db54fb15c75a347f82ed481ea7c5f8a31a17a0e08f050332a8e9a79af30fadc3609e6d695e36ec144b114a56ab4c9c2aadebd
-
SSDEEP
786432:1CIwt7yoZmMk6x7JHHskneEzQYWj49F9xDAB9Z+5wm+PaQ:4IoZSmHveCQPgrWZ++h
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2096 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2096 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe 2096 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2096 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2716 1640 cmd.exe 31 PID 1640 wrote to memory of 2716 1640 cmd.exe 31 PID 1640 wrote to memory of 2716 1640 cmd.exe 31 PID 2716 wrote to memory of 2476 2716 rundll32.exe 33 PID 2716 wrote to memory of 2476 2716 rundll32.exe 33 PID 2716 wrote to memory of 2476 2716 rundll32.exe 33 PID 2476 wrote to memory of 2096 2476 rundll32.exe 35 PID 2476 wrote to memory of 2096 2476 rundll32.exe 35 PID 2476 wrote to memory of 2096 2476 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\S500_RAT.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\S500_RAT.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\S500_RAT.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\S500_RAT.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
-