Analysis

  • max time kernel
    134s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2024 07:40

General

  • Target

    LethalCompy56.rar

  • Size

    397.6MB

  • MD5

    7d1effabab36fef396f6663b4bdb6844

  • SHA1

    999f7e31392fdfff61c601db1db30558e5e45606

  • SHA256

    48c3d1e1325f0508f5a5dc1a2e7db49b4cbbdc5058724300a4b90bd945ed0c61

  • SHA512

    9def94abf43503cfcac1b9aaa3f48db9b1bf18260a84994e210bfd83ea512bb9ec0cb88ff6a9ece4689711ea992a257c25931f2a7fc4db280c5dd8c0e9896c6a

  • SSDEEP

    12582912:AtgLKfb/i+OfybrlFKOQpSnXyFQSE6T3NRa+eh:AtgL8b/2ybhxggXyF865R0h

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\LethalCompy56.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\LethalCompy56.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\LethalCompy56.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\LethalCompy56.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1400-30-0x000007FEFAC10000-0x000007FEFAC44000-memory.dmp

    Filesize

    208KB

  • memory/1400-29-0x000000013FD50000-0x000000013FE48000-memory.dmp

    Filesize

    992KB

  • memory/1400-31-0x000007FEF6010000-0x000007FEF62C6000-memory.dmp

    Filesize

    2.7MB

  • memory/1400-32-0x000007FEFABC0000-0x000007FEFABD8000-memory.dmp

    Filesize

    96KB

  • memory/1400-33-0x000007FEFABA0000-0x000007FEFABB7000-memory.dmp

    Filesize

    92KB

  • memory/1400-34-0x000007FEFAB80000-0x000007FEFAB91000-memory.dmp

    Filesize

    68KB

  • memory/1400-35-0x000007FEFAB60000-0x000007FEFAB77000-memory.dmp

    Filesize

    92KB

  • memory/1400-36-0x000007FEFA8A0000-0x000007FEFA8B1000-memory.dmp

    Filesize

    68KB

  • memory/1400-37-0x000007FEF7240000-0x000007FEF725D000-memory.dmp

    Filesize

    116KB

  • memory/1400-49-0x000007FEF63E0000-0x000007FEF6410000-memory.dmp

    Filesize

    192KB

  • memory/1400-48-0x000007FEF6410000-0x000007FEF6428000-memory.dmp

    Filesize

    96KB

  • memory/1400-47-0x000007FEF6430000-0x000007FEF6441000-memory.dmp

    Filesize

    68KB

  • memory/1400-46-0x000007FEF6450000-0x000007FEF646B000-memory.dmp

    Filesize

    108KB

  • memory/1400-45-0x000007FEF6470000-0x000007FEF6481000-memory.dmp

    Filesize

    68KB

  • memory/1400-44-0x000007FEF6490000-0x000007FEF64A1000-memory.dmp

    Filesize

    68KB

  • memory/1400-43-0x000007FEF64B0000-0x000007FEF64C1000-memory.dmp

    Filesize

    68KB

  • memory/1400-42-0x000007FEF6F80000-0x000007FEF6F98000-memory.dmp

    Filesize

    96KB

  • memory/1400-41-0x000007FEF64D0000-0x000007FEF64F1000-memory.dmp

    Filesize

    132KB

  • memory/1400-40-0x000007FEF6FA0000-0x000007FEF6FE1000-memory.dmp

    Filesize

    260KB

  • memory/1400-39-0x000007FEF7010000-0x000007FEF7021000-memory.dmp

    Filesize

    68KB

  • memory/1400-38-0x000007FEF7030000-0x000007FEF723B000-memory.dmp

    Filesize

    2.0MB

  • memory/1400-50-0x000007FEF4710000-0x000007FEF57C0000-memory.dmp

    Filesize

    16.7MB

  • memory/1400-51-0x000007FEF5C30000-0x000007FEF5C97000-memory.dmp

    Filesize

    412KB

  • memory/1400-52-0x000007FEF3E50000-0x000007FEF3ECC000-memory.dmp

    Filesize

    496KB

  • memory/1400-53-0x000007FEF5B70000-0x000007FEF5B81000-memory.dmp

    Filesize

    68KB

  • memory/1400-54-0x000007FEF3DF0000-0x000007FEF3E47000-memory.dmp

    Filesize

    348KB

  • memory/1400-55-0x000007FEF3DA0000-0x000007FEF3DC8000-memory.dmp

    Filesize

    160KB

  • memory/1400-56-0x000007FEF3D70000-0x000007FEF3D94000-memory.dmp

    Filesize

    144KB

  • memory/1400-57-0x000007FEF3D50000-0x000007FEF3D68000-memory.dmp

    Filesize

    96KB

  • memory/1400-58-0x000007FEF3D20000-0x000007FEF3D43000-memory.dmp

    Filesize

    140KB

  • memory/1400-59-0x000007FEF3D00000-0x000007FEF3D11000-memory.dmp

    Filesize

    68KB

  • memory/1400-60-0x000007FEF3CE0000-0x000007FEF3CF2000-memory.dmp

    Filesize

    72KB

  • memory/1400-61-0x000007FEF3CB0000-0x000007FEF3CD1000-memory.dmp

    Filesize

    132KB

  • memory/1400-62-0x000007FEF3C90000-0x000007FEF3CA3000-memory.dmp

    Filesize

    76KB