Resubmissions

02-08-2024 19:42

240802-yeqptsxcrp 9

02-08-2024 19:39

240802-ydek6sscra 3

Analysis

  • max time kernel
    144s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 19:39

General

  • Target

    !#ÎnS̈tallḙr__8485--!PasSw0rd@$$.rar

  • Size

    15.7MB

  • MD5

    36a1272ed774f87de33346ffe05d0880

  • SHA1

    ecafb0d8759816c2abf2595fd8882711346043d3

  • SHA256

    db7bd4434a7f333ab66e542da613353e82caf1bccc158783146b8a698fcbc894

  • SHA512

    214910572f4d5ace13bbfab30a3fb023f5069aa33c5b1a1ef80aa8e8fb248e3b2dea7ad866e0b6fb14a76d65a5aa0f26afb5251d30d000ff13c68f11c8fde9f3

  • SSDEEP

    393216:z/Etf7jpp/H5hXnSHCl6kxnATdVabEQh8tyL2ZNgP:z/ezP/ZhXS86kY5tqQgP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\!#ÎnS̈tallḙr__8485--!PasSw0rd@$$.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\!#ÎnS̈tallḙr__8485--!PasSw0rd@$$.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\!#ÎnS̈tallḙr__8485--!PasSw0rd@$$.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\!#ÎnS̈tallḙr__8485--!PasSw0rd@$$.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-30-0x000007FEF6C00000-0x000007FEF6C34000-memory.dmp

    Filesize

    208KB

  • memory/2648-29-0x000000013FED0000-0x000000013FFC8000-memory.dmp

    Filesize

    992KB

  • memory/2648-32-0x000007FEF56A0000-0x000007FEF56B8000-memory.dmp

    Filesize

    96KB

  • memory/2648-33-0x000007FEF5680000-0x000007FEF5697000-memory.dmp

    Filesize

    92KB

  • memory/2648-34-0x000007FEF5660000-0x000007FEF5671000-memory.dmp

    Filesize

    68KB

  • memory/2648-37-0x000007FEFADE0000-0x000007FEFADFD000-memory.dmp

    Filesize

    116KB

  • memory/2648-38-0x000007FEFADC0000-0x000007FEFADD1000-memory.dmp

    Filesize

    68KB

  • memory/2648-31-0x000007FEF57F0000-0x000007FEF5AA6000-memory.dmp

    Filesize

    2.7MB

  • memory/2648-36-0x000007FEF5620000-0x000007FEF5631000-memory.dmp

    Filesize

    68KB

  • memory/2648-35-0x000007FEF5640000-0x000007FEF5657000-memory.dmp

    Filesize

    92KB

  • memory/2648-56-0x000007FEF4070000-0x000007FEF4094000-memory.dmp

    Filesize

    144KB

  • memory/2648-39-0x000007FEF4570000-0x000007FEF5620000-memory.dmp

    Filesize

    16.7MB

  • memory/2648-57-0x000007FEF6620000-0x000007FEF6638000-memory.dmp

    Filesize

    96KB

  • memory/2648-58-0x000007FEF4000000-0x000007FEF4023000-memory.dmp

    Filesize

    140KB

  • memory/2648-59-0x000007FEF3FC0000-0x000007FEF3FD1000-memory.dmp

    Filesize

    68KB

  • memory/2648-55-0x000007FEF43F0000-0x000007FEF4418000-memory.dmp

    Filesize

    160KB

  • memory/2648-60-0x000007FEF3FA0000-0x000007FEF3FB2000-memory.dmp

    Filesize

    72KB

  • memory/2648-61-0x000007FEF3F70000-0x000007FEF3F91000-memory.dmp

    Filesize

    132KB

  • memory/2648-62-0x000007FEF3F50000-0x000007FEF3F63000-memory.dmp

    Filesize

    76KB

  • memory/2648-54-0x000007FEF5C00000-0x000007FEF5C57000-memory.dmp

    Filesize

    348KB

  • memory/2648-63-0x000007FEF3410000-0x000007FEF3421000-memory.dmp

    Filesize

    68KB

  • memory/2648-53-0x000007FEF6640000-0x000007FEF6651000-memory.dmp

    Filesize

    68KB

  • memory/2648-52-0x000007FEF5CB0000-0x000007FEF5D2C000-memory.dmp

    Filesize

    496KB

  • memory/2648-51-0x000007FEF6C40000-0x000007FEF6CA7000-memory.dmp

    Filesize

    412KB

  • memory/2648-50-0x000007FEF7640000-0x000007FEF7670000-memory.dmp

    Filesize

    192KB

  • memory/2648-49-0x000007FEF7670000-0x000007FEF7688000-memory.dmp

    Filesize

    96KB

  • memory/2648-48-0x000007FEFAAE0000-0x000007FEFAAF1000-memory.dmp

    Filesize

    68KB

  • memory/2648-47-0x000007FEFAB00000-0x000007FEFAB1B000-memory.dmp

    Filesize

    108KB

  • memory/2648-46-0x000007FEFABF0000-0x000007FEFAC01000-memory.dmp

    Filesize

    68KB

  • memory/2648-45-0x000007FEFAC10000-0x000007FEFAC21000-memory.dmp

    Filesize

    68KB

  • memory/2648-44-0x000007FEFAC30000-0x000007FEFAC41000-memory.dmp

    Filesize

    68KB

  • memory/2648-43-0x000007FEFAC50000-0x000007FEFAC68000-memory.dmp

    Filesize

    96KB

  • memory/2648-42-0x000007FEFAC70000-0x000007FEFAC91000-memory.dmp

    Filesize

    132KB

  • memory/2648-41-0x000007FEFACA0000-0x000007FEFACE1000-memory.dmp

    Filesize

    260KB

  • memory/2648-40-0x000007FEF62F0000-0x000007FEF64FB000-memory.dmp

    Filesize

    2.0MB

  • memory/2648-64-0x000007FEF3310000-0x000007FEF340F000-memory.dmp

    Filesize

    1020KB