Analysis
-
max time kernel
143s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.exe
Resource
win10v2004-20240802-en
General
-
Target
ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.rar
-
Size
965KB
-
MD5
af0f3eeb7c34472f2b8c2a74d966b815
-
SHA1
c471cb4d2aebc5fd17a5268856c8f78d1f52c0fa
-
SHA256
b949f5669c31e0eae2ab38705a88ca05186d8e661e1b0965311a243a5f159412
-
SHA512
0cde649113bbf387a823a3eed9a26550643b13c65be459e0fc4ef84da9f6c898a41c4c5811f6999fdb97f48dabf2b42efc35bcb15aeb043398b603bd12de0cd6
-
SSDEEP
24576:1XjL9OupujF1OtiaahEdrgbCsNsg4BuiAsed:1XHtpujF+aYINSg4D4d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1384 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 320 OpenWith.exe 1384 vlc.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe 1384 vlc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 OpenWith.exe 320 OpenWith.exe 320 OpenWith.exe 320 OpenWith.exe 320 OpenWith.exe 1384 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 320 wrote to memory of 1384 320 OpenWith.exe 107 PID 320 wrote to memory of 1384 320 OpenWith.exe 107
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.rar"1⤵
- Modifies registry class
PID:3456
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1384
-