Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 19:33
Behavioral task
behavioral1
Sample
12345.rar
Resource
win7-20240705-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
12345.rar
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
12345.rar
-
Size
21.7MB
-
MD5
3dadce0de1686c632d20b96a511b3072
-
SHA1
9e5c707766d8696a6d1729df3670881690ee3e54
-
SHA256
c89df9ced3834fcfabe20b4e657da09f6cc62f3e974086401f79e282d983e59c
-
SHA512
dd0a6fc96102ca2a0df0d8715b3d0e3dda6afdafd835f0977e74b2229aa5435113a2b72d361dcf955f42b76252629e95afd9f4b88593d7408eaff8529eb4c375
-
SSDEEP
393216:b4YtFef8QTrX+pgeXECZtWgfP/3OP3MCyloDhytEqkS6E4zGpQ61X8Cp3swXrjr6:b4YIXBwEaHnGP32oDhSBp9SCp8wXrJsr
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 2956 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 2956 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
vlc.exepid process 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe 2956 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 2956 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 2040 wrote to memory of 1984 2040 cmd.exe rundll32.exe PID 2040 wrote to memory of 1984 2040 cmd.exe rundll32.exe PID 2040 wrote to memory of 1984 2040 cmd.exe rundll32.exe PID 1984 wrote to memory of 3056 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 3056 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 3056 1984 rundll32.exe rundll32.exe PID 3056 wrote to memory of 2956 3056 rundll32.exe vlc.exe PID 3056 wrote to memory of 2956 3056 rundll32.exe vlc.exe PID 3056 wrote to memory of 2956 3056 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\12345.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\12345.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\12345.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\12345.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2956