Overview
overview
9Static
static
7unl.rar
windows7-x64
3unl.rar
windows10-2004-x64
3unl/Spotify.cfg
windows7-x64
3unl/Spotify.cfg
windows10-2004-x64
3unl/blobs/a.ini
windows7-x64
1unl/blobs/a.ini
windows10-2004-x64
1unl/blobs/b.ini
windows7-x64
1unl/blobs/b.ini
windows10-2004-x64
1unl/unl_cracked.exe
windows7-x64
9unl/unl_cracked.exe
windows10-2004-x64
9Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 01:15
Behavioral task
behavioral1
Sample
unl.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
unl.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
unl/Spotify.cfg
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
unl/Spotify.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
unl/blobs/a.ini
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
unl/blobs/a.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
unl/blobs/b.ini
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
unl/blobs/b.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
unl/unl_cracked.exe
Resource
win7-20240705-en
General
-
Target
unl.rar
-
Size
4.4MB
-
MD5
6ba19488c35123fc1e3973361bb1dd42
-
SHA1
7916a608fd178d83b94718b78a4d841157f5f831
-
SHA256
3ecc7cb0d0c4d0509df3506fe19199daf409011d24c2163eb035919cfd3f1b85
-
SHA512
14928e3b249f66a8b49c4afb11715b1e0921f0e7aba6449865a00ecb9e0a8cddf7bc6b6b56a0d984ec4018096e75a0b2d4a0f016de0201fdde6cb48829ecd143
-
SSDEEP
98304:E6amRFwnveHxouhYhVk9cF7i+xW12fVyxUt21KZ0CmOv8dfEtYItW5zhmEI:E6JBHxodhVMcF7ikWOm+Z0C30ds5eVmt
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1004 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1004 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1004 vlc.exe 1004 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1004 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2848 3064 cmd.exe 31 PID 3064 wrote to memory of 2848 3064 cmd.exe 31 PID 3064 wrote to memory of 2848 3064 cmd.exe 31 PID 2848 wrote to memory of 324 2848 rundll32.exe 32 PID 2848 wrote to memory of 324 2848 rundll32.exe 32 PID 2848 wrote to memory of 324 2848 rundll32.exe 32 PID 324 wrote to memory of 1004 324 rundll32.exe 34 PID 324 wrote to memory of 1004 324 rundll32.exe 34 PID 324 wrote to memory of 1004 324 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\unl.rar1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\unl.rar2⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\unl.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\unl.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
-