Resubmissions

02/08/2024, 14:36

240802-ryvdssxgqm 8

Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 14:36

General

  • Target

    Spoofers/Full_Loader.rar

  • Size

    13.6MB

  • MD5

    01e8cd80bf48a3fc5da28e9eca5a6a3d

  • SHA1

    3807d8a454752e98f0b588f9cd0125ac138f50cb

  • SHA256

    d43da4cd2ab166af6c63e83230372a50d304626a0d6a32fac4440a681e6cd1c1

  • SHA512

    778bce8ae7e247ea28d832a064fc1bc1181211d187550abc65cd62cce1d7d44824778797b836983c40679ce22b61b9e142427607dac2cfcf8e0f751aa53a170f

  • SSDEEP

    393216:Co3Lhwt736M9wPLeJpZHGT2zKQnMMdcmo1HB:CWNwR36hKJpZmKzpnPdcmo1HB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Spoofers\Full_Loader.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Spoofers\Full_Loader.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Spoofers\Full_Loader.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Spoofers\Full_Loader.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2668-25-0x000007FEFA600000-0x000007FEFA634000-memory.dmp

    Filesize

    208KB

  • memory/2668-24-0x000000013F3E0000-0x000000013F4D8000-memory.dmp

    Filesize

    992KB

  • memory/2668-28-0x000007FEFA910000-0x000007FEFA927000-memory.dmp

    Filesize

    92KB

  • memory/2668-29-0x000007FEFA5E0000-0x000007FEFA5F1000-memory.dmp

    Filesize

    68KB

  • memory/2668-27-0x000007FEFAC90000-0x000007FEFACA8000-memory.dmp

    Filesize

    96KB

  • memory/2668-30-0x000007FEFA5C0000-0x000007FEFA5D7000-memory.dmp

    Filesize

    92KB

  • memory/2668-31-0x000007FEF7270000-0x000007FEF7281000-memory.dmp

    Filesize

    68KB

  • memory/2668-32-0x000007FEF7250000-0x000007FEF726D000-memory.dmp

    Filesize

    116KB

  • memory/2668-26-0x000007FEF5E10000-0x000007FEF60C6000-memory.dmp

    Filesize

    2.7MB

  • memory/2668-34-0x000007FEF7230000-0x000007FEF7241000-memory.dmp

    Filesize

    68KB

  • memory/2668-42-0x000007FEF58B0000-0x000007FEF58C1000-memory.dmp

    Filesize

    68KB

  • memory/2668-43-0x000007FEF5890000-0x000007FEF58A8000-memory.dmp

    Filesize

    96KB

  • memory/2668-41-0x000007FEF58D0000-0x000007FEF58EB000-memory.dmp

    Filesize

    108KB

  • memory/2668-40-0x000007FEF58F0000-0x000007FEF5901000-memory.dmp

    Filesize

    68KB

  • memory/2668-39-0x000007FEF66A0000-0x000007FEF66B1000-memory.dmp

    Filesize

    68KB

  • memory/2668-38-0x000007FEF66C0000-0x000007FEF66D1000-memory.dmp

    Filesize

    68KB

  • memory/2668-33-0x000007FEF5910000-0x000007FEF5B1B000-memory.dmp

    Filesize

    2.0MB

  • memory/2668-44-0x000007FEF5860000-0x000007FEF5890000-memory.dmp

    Filesize

    192KB

  • memory/2668-37-0x000007FEF66E0000-0x000007FEF66F8000-memory.dmp

    Filesize

    96KB

  • memory/2668-36-0x000007FEF6700000-0x000007FEF6721000-memory.dmp

    Filesize

    132KB

  • memory/2668-35-0x000007FEF6730000-0x000007FEF6771000-memory.dmp

    Filesize

    260KB

  • memory/2668-52-0x000007FEF5670000-0x000007FEF5688000-memory.dmp

    Filesize

    96KB

  • memory/2668-55-0x000007FEF5600000-0x000007FEF5612000-memory.dmp

    Filesize

    72KB

  • memory/2668-54-0x000007FEF5620000-0x000007FEF5631000-memory.dmp

    Filesize

    68KB

  • memory/2668-53-0x000007FEF5640000-0x000007FEF5663000-memory.dmp

    Filesize

    140KB

  • memory/2668-45-0x000007FEF40A0000-0x000007FEF5150000-memory.dmp

    Filesize

    16.7MB

  • memory/2668-51-0x000007FEF5690000-0x000007FEF56B4000-memory.dmp

    Filesize

    144KB

  • memory/2668-50-0x000007FEF56C0000-0x000007FEF56E8000-memory.dmp

    Filesize

    160KB

  • memory/2668-49-0x000007FEF56F0000-0x000007FEF5747000-memory.dmp

    Filesize

    348KB

  • memory/2668-48-0x000007FEF5750000-0x000007FEF5761000-memory.dmp

    Filesize

    68KB

  • memory/2668-47-0x000007FEF5770000-0x000007FEF57EC000-memory.dmp

    Filesize

    496KB

  • memory/2668-46-0x000007FEF57F0000-0x000007FEF5857000-memory.dmp

    Filesize

    412KB