Analysis

  • max time kernel
    1724s
  • max time network
    1507s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 07:47

General

  • Target

    R D X E 6 5.rar

  • Size

    10.7MB

  • MD5

    bf488a28c0aa529bf8ff779b673d58fb

  • SHA1

    687f8e7164f642d746a7c7b7dd5c1c70d1e1453c

  • SHA256

    f29f8a8d5cf10644a4fecee5eefacfdad688b0b96540cd68ea4ae7058bfe327b

  • SHA512

    3c02bd2718eaf58c7cd70c6cebf1c797a5cab5a684918eaa5068e836897c5ef4091f3dca1badb1bb86557a8ad103b1de39b5e19efd60029baf67f13244e0c542

  • SSDEEP

    196608:qfMWCbdJFQ4G78fFZ0sqBCaSqLHjgIoX8ExcBjP3hIksFQQdO5:hWCJfBFZ0sCd4IoMecV/hHsOQc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\R D X E 6 5.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\R D X E 6 5.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\R D X E 6 5.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\R D X E 6 5.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1248-30-0x000007FEFADA0000-0x000007FEFADD4000-memory.dmp

    Filesize

    208KB

  • memory/1248-29-0x000000013F4D0000-0x000000013F5C8000-memory.dmp

    Filesize

    992KB

  • memory/1248-32-0x000007FEFAD50000-0x000007FEFAD68000-memory.dmp

    Filesize

    96KB

  • memory/1248-33-0x000007FEFAD30000-0x000007FEFAD47000-memory.dmp

    Filesize

    92KB

  • memory/1248-34-0x000007FEFAD10000-0x000007FEFAD21000-memory.dmp

    Filesize

    68KB

  • memory/1248-35-0x000007FEFACF0000-0x000007FEFAD07000-memory.dmp

    Filesize

    92KB

  • memory/1248-38-0x000007FEFAC10000-0x000007FEFAC21000-memory.dmp

    Filesize

    68KB

  • memory/1248-37-0x000007FEFAC30000-0x000007FEFAC4D000-memory.dmp

    Filesize

    116KB

  • memory/1248-36-0x000007FEFACD0000-0x000007FEFACE1000-memory.dmp

    Filesize

    68KB

  • memory/1248-31-0x000007FEF6180000-0x000007FEF6436000-memory.dmp

    Filesize

    2.7MB

  • memory/1248-40-0x000007FEF5EF0000-0x000007FEF60FB000-memory.dmp

    Filesize

    2.0MB

  • memory/1248-42-0x000007FEFAA60000-0x000007FEFAA81000-memory.dmp

    Filesize

    132KB

  • memory/1248-46-0x000007FEF7150000-0x000007FEF7161000-memory.dmp

    Filesize

    68KB

  • memory/1248-45-0x000007FEF7170000-0x000007FEF7181000-memory.dmp

    Filesize

    68KB

  • memory/1248-44-0x000007FEF7190000-0x000007FEF71A1000-memory.dmp

    Filesize

    68KB

  • memory/1248-43-0x000007FEFABF0000-0x000007FEFAC08000-memory.dmp

    Filesize

    96KB

  • memory/1248-41-0x000007FEFAB60000-0x000007FEFABA1000-memory.dmp

    Filesize

    260KB

  • memory/1248-50-0x000007FEF65C0000-0x000007FEF65F0000-memory.dmp

    Filesize

    192KB

  • memory/1248-53-0x000007FEF65A0000-0x000007FEF65B1000-memory.dmp

    Filesize

    68KB

  • memory/1248-55-0x000007FEF6570000-0x000007FEF6598000-memory.dmp

    Filesize

    160KB

  • memory/1248-51-0x000007FEF5E80000-0x000007FEF5EE7000-memory.dmp

    Filesize

    412KB

  • memory/1248-62-0x000007FEF5770000-0x000007FEF5783000-memory.dmp

    Filesize

    76KB

  • memory/1248-61-0x000007FEF4450000-0x000007FEF4471000-memory.dmp

    Filesize

    132KB

  • memory/1248-60-0x000007FEF5790000-0x000007FEF57A2000-memory.dmp

    Filesize

    72KB

  • memory/1248-59-0x000007FEF57B0000-0x000007FEF57C1000-memory.dmp

    Filesize

    68KB

  • memory/1248-58-0x000007FEF5840000-0x000007FEF5863000-memory.dmp

    Filesize

    140KB

  • memory/1248-57-0x000007FEF5870000-0x000007FEF5888000-memory.dmp

    Filesize

    96KB

  • memory/1248-56-0x000007FEF6150000-0x000007FEF6174000-memory.dmp

    Filesize

    144KB

  • memory/1248-54-0x000007FEF5D00000-0x000007FEF5D57000-memory.dmp

    Filesize

    348KB

  • memory/1248-52-0x000007FEF5D60000-0x000007FEF5DDC000-memory.dmp

    Filesize

    496KB

  • memory/1248-49-0x000007FEF70F0000-0x000007FEF7108000-memory.dmp

    Filesize

    96KB

  • memory/1248-48-0x000007FEF7110000-0x000007FEF7121000-memory.dmp

    Filesize

    68KB

  • memory/1248-47-0x000007FEF7130000-0x000007FEF714B000-memory.dmp

    Filesize

    108KB

  • memory/1248-39-0x000007FEF46B0000-0x000007FEF5760000-memory.dmp

    Filesize

    16.7MB