Resubmissions

19/08/2024, 12:01

240819-n65yqawemm 3

19/08/2024, 11:59

240819-n53f7ssfpf 3

Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 12:01

General

  • Target

    _Getintopc.com_SoundToys.v5.0.1.10839.rar

  • Size

    74.2MB

  • MD5

    f5725ab8f2efd81550a7d4d47f354e24

  • SHA1

    b282ff8fd33fd3def1e76f5a3d86609bfee06048

  • SHA256

    ad220d0a3f32ed496c856e5e8cfa2de84b86666247245e862eb6509c1427e8ff

  • SHA512

    6e7895f706351ace73b57496618e6a044e5f481aeb0ae31fa90dcf40ce91d4c3f627ab3cbaea3f2fb21f76ae46877c5e43216c7e3908e1347e118d4dd433cb4e

  • SSDEEP

    1572864:TbuSn781bt5PTQk5O34Kh9J5MkMggUT5McV3/I/RKEcEqb4mZM+Gwp3PJuP:3bn7qjPckA3lh9gjggsMcV3w/cEO48/O

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\_Getintopc.com_SoundToys.v5.0.1.10839.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\_Getintopc.com_SoundToys.v5.0.1.10839.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\_Getintopc.com_SoundToys.v5.0.1.10839.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\_Getintopc.com_SoundToys.v5.0.1.10839.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2024-35-0x000007FEF5190000-0x000007FEF51C4000-memory.dmp

    Filesize

    208KB

  • memory/2024-34-0x000000013FD80000-0x000000013FE78000-memory.dmp

    Filesize

    992KB

  • memory/2024-37-0x000007FEF6BC0000-0x000007FEF6BD8000-memory.dmp

    Filesize

    96KB

  • memory/2024-39-0x000007FEF63A0000-0x000007FEF63B1000-memory.dmp

    Filesize

    68KB

  • memory/2024-38-0x000007FEF6A20000-0x000007FEF6A37000-memory.dmp

    Filesize

    92KB

  • memory/2024-40-0x000007FEF4D80000-0x000007FEF4D97000-memory.dmp

    Filesize

    92KB

  • memory/2024-41-0x000007FEF4D60000-0x000007FEF4D71000-memory.dmp

    Filesize

    68KB

  • memory/2024-43-0x000007FEF4D20000-0x000007FEF4D31000-memory.dmp

    Filesize

    68KB

  • memory/2024-42-0x000007FEF4D40000-0x000007FEF4D5D000-memory.dmp

    Filesize

    116KB

  • memory/2024-36-0x000007FEF4ED0000-0x000007FEF5186000-memory.dmp

    Filesize

    2.7MB

  • memory/2024-44-0x000007FEF4B10000-0x000007FEF4D1B000-memory.dmp

    Filesize

    2.0MB

  • memory/2024-47-0x000007FEF39E0000-0x000007FEF3A01000-memory.dmp

    Filesize

    132KB

  • memory/2024-48-0x000007FEF39C0000-0x000007FEF39D8000-memory.dmp

    Filesize

    96KB

  • memory/2024-46-0x000007FEF3A10000-0x000007FEF3A51000-memory.dmp

    Filesize

    260KB

  • memory/2024-50-0x000007FEF3980000-0x000007FEF3991000-memory.dmp

    Filesize

    68KB

  • memory/2024-51-0x000007FEF3960000-0x000007FEF3971000-memory.dmp

    Filesize

    68KB

  • memory/2024-49-0x000007FEF39A0000-0x000007FEF39B1000-memory.dmp

    Filesize

    68KB

  • memory/2024-52-0x000007FEF3940000-0x000007FEF395B000-memory.dmp

    Filesize

    108KB

  • memory/2024-53-0x000007FEF3920000-0x000007FEF3931000-memory.dmp

    Filesize

    68KB

  • memory/2024-54-0x000007FEF3900000-0x000007FEF3918000-memory.dmp

    Filesize

    96KB

  • memory/2024-56-0x000007FEF3860000-0x000007FEF38C7000-memory.dmp

    Filesize

    412KB

  • memory/2024-55-0x000007FEF38D0000-0x000007FEF3900000-memory.dmp

    Filesize

    192KB

  • memory/2024-60-0x000007FEF3730000-0x000007FEF3758000-memory.dmp

    Filesize

    160KB

  • memory/2024-59-0x000007FEF3760000-0x000007FEF37B7000-memory.dmp

    Filesize

    348KB

  • memory/2024-58-0x000007FEF37C0000-0x000007FEF37D1000-memory.dmp

    Filesize

    68KB

  • memory/2024-57-0x000007FEF37E0000-0x000007FEF385C000-memory.dmp

    Filesize

    496KB

  • memory/2024-61-0x000007FEF3700000-0x000007FEF3724000-memory.dmp

    Filesize

    144KB

  • memory/2024-62-0x000007FEF36E0000-0x000007FEF36F8000-memory.dmp

    Filesize

    96KB

  • memory/2024-66-0x000007FEF29A0000-0x000007FEF29B7000-memory.dmp

    Filesize

    92KB

  • memory/2024-65-0x000007FEF3670000-0x000007FEF3682000-memory.dmp

    Filesize

    72KB

  • memory/2024-64-0x000007FEF3690000-0x000007FEF36A1000-memory.dmp

    Filesize

    68KB

  • memory/2024-63-0x000007FEF36B0000-0x000007FEF36D3000-memory.dmp

    Filesize

    140KB

  • memory/2024-45-0x000007FEF3A60000-0x000007FEF4B10000-memory.dmp

    Filesize

    16.7MB