Analysis
-
max time kernel
1794s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 07:51
Behavioral task
behavioral1
Sample
Client-built.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Client-built.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Client-built.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Client-built.exe
Resource
win10v2004-20240802-en
General
-
Target
Client-built.rar
-
Size
26KB
-
MD5
0d1810f13c1c5984d4777f347b85d5f9
-
SHA1
e977a14d3bcca98ce8b96587c9611971c0d7b859
-
SHA256
09b05c6c7f16211f86208d668021ecc8900d6d3b5c2dd449f7fbfe99f832cd72
-
SHA512
4178c8c409a4ac8db4c9dbcf1dd594712f643025241961c4d4a3b0de88a458bd29154b06ec9940681fe310b7d2f9129a8e5016519a506348527dc02446b2ed9a
-
SSDEEP
384:fW9YI/BNY0xjvRF8tmA2MXnd2F/v1gkRi5510OjvH+lAR0PpAHOzBEE+iPUmeKm:fWqgcA5CtmA2cd2FmhJGM0RAuz0i8mZm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 588 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 588 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe 588 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 588 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2600 3008 cmd.exe 31 PID 3008 wrote to memory of 2600 3008 cmd.exe 31 PID 3008 wrote to memory of 2600 3008 cmd.exe 31 PID 2600 wrote to memory of 2836 2600 rundll32.exe 32 PID 2600 wrote to memory of 2836 2600 rundll32.exe 32 PID 2600 wrote to memory of 2836 2600 rundll32.exe 32 PID 2836 wrote to memory of 588 2836 rundll32.exe 34 PID 2836 wrote to memory of 588 2836 rundll32.exe 34 PID 2836 wrote to memory of 588 2836 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Client-built.rar1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Client-built.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Client-built.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Client-built.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:588
-
-
-