Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 01:15

General

  • Target

    unl.rar

  • Size

    4.4MB

  • MD5

    6ba19488c35123fc1e3973361bb1dd42

  • SHA1

    7916a608fd178d83b94718b78a4d841157f5f831

  • SHA256

    3ecc7cb0d0c4d0509df3506fe19199daf409011d24c2163eb035919cfd3f1b85

  • SHA512

    14928e3b249f66a8b49c4afb11715b1e0921f0e7aba6449865a00ecb9e0a8cddf7bc6b6b56a0d984ec4018096e75a0b2d4a0f016de0201fdde6cb48829ecd143

  • SSDEEP

    98304:E6amRFwnveHxouhYhVk9cF7i+xW12fVyxUt21KZ0CmOv8dfEtYItW5zhmEI:E6JBHxodhVMcF7ikWOm+Z0C30ds5eVmt

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\unl.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\unl.rar
      2⤵
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\unl.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\unl.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1004-24-0x000000013F620000-0x000000013F718000-memory.dmp

    Filesize

    992KB

  • memory/1004-25-0x000007FEFACB0000-0x000007FEFACE4000-memory.dmp

    Filesize

    208KB

  • memory/1004-27-0x000007FEFAD30000-0x000007FEFAD48000-memory.dmp

    Filesize

    96KB

  • memory/1004-32-0x000007FEFA950000-0x000007FEFA96D000-memory.dmp

    Filesize

    116KB

  • memory/1004-33-0x000007FEF7720000-0x000007FEF7731000-memory.dmp

    Filesize

    68KB

  • memory/1004-31-0x000007FEFA970000-0x000007FEFA981000-memory.dmp

    Filesize

    68KB

  • memory/1004-30-0x000007FEFA990000-0x000007FEFA9A7000-memory.dmp

    Filesize

    92KB

  • memory/1004-29-0x000007FEFA9B0000-0x000007FEFA9C1000-memory.dmp

    Filesize

    68KB

  • memory/1004-26-0x000007FEF6190000-0x000007FEF6446000-memory.dmp

    Filesize

    2.7MB

  • memory/1004-28-0x000007FEFA9D0000-0x000007FEFA9E7000-memory.dmp

    Filesize

    92KB

  • memory/1004-34-0x000007FEF5F80000-0x000007FEF618B000-memory.dmp

    Filesize

    2.0MB

  • memory/1004-36-0x000007FEF76D0000-0x000007FEF7711000-memory.dmp

    Filesize

    260KB

  • memory/1004-37-0x000007FEF6A60000-0x000007FEF6A81000-memory.dmp

    Filesize

    132KB

  • memory/1004-38-0x000007FEF6EC0000-0x000007FEF6ED8000-memory.dmp

    Filesize

    96KB

  • memory/1004-43-0x000007FEF69C0000-0x000007FEF69D1000-memory.dmp

    Filesize

    68KB

  • memory/1004-45-0x000007FEF6970000-0x000007FEF69A0000-memory.dmp

    Filesize

    192KB

  • memory/1004-35-0x000007FEF4730000-0x000007FEF57E0000-memory.dmp

    Filesize

    16.7MB

  • memory/1004-56-0x000007FEF21B0000-0x000007FEF21C7000-memory.dmp

    Filesize

    92KB

  • memory/1004-55-0x000007FEF5DD0000-0x000007FEF5DE2000-memory.dmp

    Filesize

    72KB

  • memory/1004-54-0x000007FEF5DF0000-0x000007FEF5E01000-memory.dmp

    Filesize

    68KB

  • memory/1004-53-0x000007FEF5E10000-0x000007FEF5E33000-memory.dmp

    Filesize

    140KB

  • memory/1004-51-0x000007FEF5E40000-0x000007FEF5E64000-memory.dmp

    Filesize

    144KB

  • memory/1004-50-0x000007FEF5E70000-0x000007FEF5E98000-memory.dmp

    Filesize

    160KB

  • memory/1004-49-0x000007FEF5EA0000-0x000007FEF5EF7000-memory.dmp

    Filesize

    348KB

  • memory/1004-48-0x000007FEF68E0000-0x000007FEF68F1000-memory.dmp

    Filesize

    68KB

  • memory/1004-47-0x000007FEF5F00000-0x000007FEF5F7C000-memory.dmp

    Filesize

    496KB

  • memory/1004-52-0x000007FEF6490000-0x000007FEF64A8000-memory.dmp

    Filesize

    96KB

  • memory/1004-46-0x000007FEF6900000-0x000007FEF6967000-memory.dmp

    Filesize

    412KB

  • memory/1004-44-0x000007FEF69A0000-0x000007FEF69B8000-memory.dmp

    Filesize

    96KB

  • memory/1004-42-0x000007FEF69E0000-0x000007FEF69FB000-memory.dmp

    Filesize

    108KB

  • memory/1004-41-0x000007FEF6A00000-0x000007FEF6A11000-memory.dmp

    Filesize

    68KB

  • memory/1004-40-0x000007FEF6A20000-0x000007FEF6A31000-memory.dmp

    Filesize

    68KB

  • memory/1004-39-0x000007FEF6A40000-0x000007FEF6A51000-memory.dmp

    Filesize

    68KB