Resubmissions

03-08-2024 19:46

240803-yg8nestbqr 10

03-08-2024 19:44

240803-ygbcxsxhld 6

03-08-2024 19:41

240803-yd6pnaxgpa 6

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-08-2024 19:41

General

  • Target

    win-airplay.zip

  • Size

    14.5MB

  • MD5

    79907c402bfd25fa29f2fa1336b292af

  • SHA1

    0f914d4eec4c6d3005b80ff6500a14fec13a384d

  • SHA256

    8b9147aeca757bc36f30e98c7481ec302d2be6de1b893a6f2ad80864f1106fb3

  • SHA512

    f4f5b53ad78e89409e46179db2286842a6edb14c920c466c57ad160ef17cc95055fe610de9dc122ccb682ec0f1ea2bd7908e52eac8193c846a8da277d42a6bd6

  • SSDEEP

    393216:5CSO2to+1kmcVJ2HvYPE+cgLGYlaARy7nMvuC7O2XmA0:5CSO26+1kJLwD4RhmCq3

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\win-airplay.zip
    1⤵
      PID:4012
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2308
      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\RevokeInstall.xlsx"
        1⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2436

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
        Filesize

        326B

        MD5

        8a1c8136b0d2b058562d4a976b3fb993

        SHA1

        46fe040705ab11cbce6d9b52c39d15e482190b14

        SHA256

        faad8a77e447b5bf5e7c5642ea0efdb04370c2c6ffcb1f34b70bea9e902fc29c

        SHA512

        f5e62e93964e3f14bb7bc68a39df9e9d29a21fa90b1b082f151b152fa68a277bfa1218d4d51d89346d1cd1635c22c2e633094801bdb563423e42b7a0952b877f

      • memory/2436-11-0x00007FFB0F0D0000-0x00007FFB0F0E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-43-0x00007FFB51440000-0x00007FFB51649000-memory.dmp
        Filesize

        2.0MB

      • memory/2436-10-0x00007FFB51440000-0x00007FFB51649000-memory.dmp
        Filesize

        2.0MB

      • memory/2436-4-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-6-0x00007FFB51440000-0x00007FFB51649000-memory.dmp
        Filesize

        2.0MB

      • memory/2436-7-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-5-0x00007FFB51440000-0x00007FFB51649000-memory.dmp
        Filesize

        2.0MB

      • memory/2436-9-0x00007FFB51440000-0x00007FFB51649000-memory.dmp
        Filesize

        2.0MB

      • memory/2436-2-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-3-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-12-0x00007FFB51440000-0x00007FFB51649000-memory.dmp
        Filesize

        2.0MB

      • memory/2436-8-0x00007FFB51440000-0x00007FFB51649000-memory.dmp
        Filesize

        2.0MB

      • memory/2436-13-0x00007FFB0F0D0000-0x00007FFB0F0E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-0-0x00007FFB514E3000-0x00007FFB514E4000-memory.dmp
        Filesize

        4KB

      • memory/2436-39-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-41-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-42-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-40-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB

      • memory/2436-1-0x00007FFB114D0000-0x00007FFB114E0000-memory.dmp
        Filesize

        64KB