Analysis

  • max time kernel
    140s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 04:31

General

  • Target

    mus/noelle_normal.ogg

  • Size

    1.1MB

  • MD5

    e104d7d8c65fd26cf9dccf797f5358a7

  • SHA1

    18db46043bf9672a47d0c225ad52fea065a951cd

  • SHA256

    ada7b196658c1949987b63149793d44eda2ec8448a7b79f3a54d07bfe175d700

  • SHA512

    86de3710dbf5af4d80a1963ead74239e6a9c039b145dcf778157f6b4cf41e6d774648769cb69ca299373240eabf004adb3b7ff2f831f23b3a0f417c6f4683d71

  • SSDEEP

    24576:w4QEsVzZyIdWw4xXGMkIzsbogYYomt6hxRq+5u:5QEsryyWkMTzngT4M

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\mus\noelle_normal.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\mus\noelle_normal.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:520
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f8 0x45c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3660

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/520-5-0x00007FF6560B0000-0x00007FF6561A8000-memory.dmp

          Filesize

          992KB

        • memory/520-6-0x00007FFCCA000000-0x00007FFCCA034000-memory.dmp

          Filesize

          208KB

        • memory/520-14-0x00007FFCC6EB0000-0x00007FFCC6EC1000-memory.dmp

          Filesize

          68KB

        • memory/520-7-0x00007FFCB9BD0000-0x00007FFCB9E86000-memory.dmp

          Filesize

          2.7MB

        • memory/520-13-0x00007FFCC7020000-0x00007FFCC703D000-memory.dmp

          Filesize

          116KB

        • memory/520-16-0x00007FFCC1230000-0x00007FFCC1271000-memory.dmp

          Filesize

          260KB

        • memory/520-15-0x00007FFCB99C0000-0x00007FFCB9BCB000-memory.dmp

          Filesize

          2.0MB

        • memory/520-12-0x00007FFCC9000000-0x00007FFCC9011000-memory.dmp

          Filesize

          68KB

        • memory/520-11-0x00007FFCC9A80000-0x00007FFCC9A97000-memory.dmp

          Filesize

          92KB

        • memory/520-10-0x00007FFCC9AA0000-0x00007FFCC9AB1000-memory.dmp

          Filesize

          68KB

        • memory/520-9-0x00007FFCC9CA0000-0x00007FFCC9CB7000-memory.dmp

          Filesize

          92KB

        • memory/520-8-0x00007FFCC9F90000-0x00007FFCC9FA8000-memory.dmp

          Filesize

          96KB

        • memory/520-22-0x00007FFCC1210000-0x00007FFCC1221000-memory.dmp

          Filesize

          68KB

        • memory/520-21-0x00007FFCC18C0000-0x00007FFCC18D1000-memory.dmp

          Filesize

          68KB

        • memory/520-20-0x00007FFCC5880000-0x00007FFCC5891000-memory.dmp

          Filesize

          68KB

        • memory/520-19-0x00007FFCC6E90000-0x00007FFCC6EA8000-memory.dmp

          Filesize

          96KB

        • memory/520-18-0x00007FFCBC010000-0x00007FFCBC031000-memory.dmp

          Filesize

          132KB

        • memory/520-17-0x00007FFCB8910000-0x00007FFCB99C0000-memory.dmp

          Filesize

          16.7MB