Analysis

  • max time kernel
    1794s
  • max time network
    1563s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 15:03

General

  • Target

    SetupFile.rar

  • Size

    21.2MB

  • MD5

    fdeff64f7ebef207d321980736051fe5

  • SHA1

    38dbf540db77bc39456337e87b3b8cc8857cfa83

  • SHA256

    149d7b388342522e1efe656199c8ad51a271d7787e6a6560426b77590fc3fe9e

  • SHA512

    91967f89ed490ec5ac346b6d5e66075e7e3e136677ff1d943f9425b6068694f408d6242da02390e463e050fea6c0aff1cf5a709681dfb2f7bbf57c4b5608830c

  • SSDEEP

    393216:CG39cVqJ8lF24rJOp+K8JF3Uno0DG8C3qvMDelDZ/r5ql3ZPAR4nLv9+2nxhD:CG39cFF2Gr5Uo0St/ejaPARZ2xhD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\SetupFile.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SetupFile.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SetupFile.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\SetupFile.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/108-30-0x000007FEF7B20000-0x000007FEF7B54000-memory.dmp

    Filesize

    208KB

  • memory/108-29-0x000000013F680000-0x000000013F778000-memory.dmp

    Filesize

    992KB

  • memory/108-38-0x000007FEF6DF0000-0x000007FEF6E01000-memory.dmp

    Filesize

    68KB

  • memory/108-37-0x000007FEF6E10000-0x000007FEF6E2D000-memory.dmp

    Filesize

    116KB

  • memory/108-36-0x000007FEF6E30000-0x000007FEF6E41000-memory.dmp

    Filesize

    68KB

  • memory/108-35-0x000007FEF6E50000-0x000007FEF6E67000-memory.dmp

    Filesize

    92KB

  • memory/108-34-0x000007FEF7AC0000-0x000007FEF7AD1000-memory.dmp

    Filesize

    68KB

  • memory/108-33-0x000007FEF7AE0000-0x000007FEF7AF7000-memory.dmp

    Filesize

    92KB

  • memory/108-31-0x000007FEF6650000-0x000007FEF6906000-memory.dmp

    Filesize

    2.7MB

  • memory/108-32-0x000007FEF7B00000-0x000007FEF7B18000-memory.dmp

    Filesize

    96KB

  • memory/108-39-0x000007FEF6440000-0x000007FEF664B000-memory.dmp

    Filesize

    2.0MB

  • memory/108-41-0x000007FEF6970000-0x000007FEF69B1000-memory.dmp

    Filesize

    260KB

  • memory/108-42-0x000007FEF6410000-0x000007FEF6431000-memory.dmp

    Filesize

    132KB

  • memory/108-43-0x000007FEF6950000-0x000007FEF6968000-memory.dmp

    Filesize

    96KB

  • memory/108-44-0x000007FEF63F0000-0x000007FEF6401000-memory.dmp

    Filesize

    68KB

  • memory/108-40-0x000007FEF4C50000-0x000007FEF5D00000-memory.dmp

    Filesize

    16.7MB

  • memory/108-61-0x000007FEF2600000-0x000007FEF2617000-memory.dmp

    Filesize

    92KB

  • memory/108-60-0x000007FEF60C0000-0x000007FEF60D2000-memory.dmp

    Filesize

    72KB

  • memory/108-59-0x000007FEF60E0000-0x000007FEF60F1000-memory.dmp

    Filesize

    68KB

  • memory/108-58-0x000007FEF6100000-0x000007FEF6123000-memory.dmp

    Filesize

    140KB

  • memory/108-57-0x000007FEF6130000-0x000007FEF6148000-memory.dmp

    Filesize

    96KB

  • memory/108-56-0x000007FEF6150000-0x000007FEF6174000-memory.dmp

    Filesize

    144KB

  • memory/108-55-0x000007FEF6180000-0x000007FEF61A8000-memory.dmp

    Filesize

    160KB

  • memory/108-54-0x000007FEF61B0000-0x000007FEF6207000-memory.dmp

    Filesize

    348KB

  • memory/108-53-0x000007FEF6210000-0x000007FEF6221000-memory.dmp

    Filesize

    68KB

  • memory/108-52-0x000007FEF6230000-0x000007FEF62AC000-memory.dmp

    Filesize

    496KB

  • memory/108-50-0x000007FEF6320000-0x000007FEF6350000-memory.dmp

    Filesize

    192KB

  • memory/108-49-0x000007FEF6350000-0x000007FEF6368000-memory.dmp

    Filesize

    96KB

  • memory/108-48-0x000007FEF6370000-0x000007FEF6381000-memory.dmp

    Filesize

    68KB

  • memory/108-47-0x000007FEF6390000-0x000007FEF63AB000-memory.dmp

    Filesize

    108KB

  • memory/108-46-0x000007FEF63B0000-0x000007FEF63C1000-memory.dmp

    Filesize

    68KB

  • memory/108-45-0x000007FEF63D0000-0x000007FEF63E1000-memory.dmp

    Filesize

    68KB

  • memory/108-51-0x000007FEF62B0000-0x000007FEF6317000-memory.dmp

    Filesize

    412KB