Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 04:31

General

  • Target

    mus/noelle_school.ogg

  • Size

    430KB

  • MD5

    d85a77183447fdd6019f77af480a4530

  • SHA1

    e0e9d48b76594a7ace6fcc47a03b443794fdaebb

  • SHA256

    a806c14cfbfc1e5847f904e5186bb1942752461a1d09258063f673fb8104f62d

  • SHA512

    db4e21a3d39ee5eb38fe0b678e3f53d76d93827b294c5db59fe0c85fea0a33342a7358294779ee98a1c77cb16603bdbd67cc6bb9d7f53722fd06c1440a5af73c

  • SSDEEP

    12288:O57145myw+A1aM6rjay7CDGjahIR8/Bbx5Ouwk/MJ/K:O5djHgYXAk/MJS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\mus\noelle_school.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\mus\noelle_school.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1692
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x484 0x33c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-5-0x00007FF799E60000-0x00007FF799F58000-memory.dmp

    Filesize

    992KB

  • memory/1692-6-0x00007FFED06B0000-0x00007FFED06E4000-memory.dmp

    Filesize

    208KB

  • memory/1692-14-0x00007FFEC1630000-0x00007FFEC1641000-memory.dmp

    Filesize

    68KB

  • memory/1692-7-0x00007FFEC0A40000-0x00007FFEC0CF6000-memory.dmp

    Filesize

    2.7MB

  • memory/1692-15-0x00007FFEC0640000-0x00007FFEC084B000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-16-0x00007FFEC15E0000-0x00007FFEC1621000-memory.dmp

    Filesize

    260KB

  • memory/1692-13-0x00007FFEC23B0000-0x00007FFEC23CD000-memory.dmp

    Filesize

    116KB

  • memory/1692-12-0x00007FFEC23D0000-0x00007FFEC23E1000-memory.dmp

    Filesize

    68KB

  • memory/1692-11-0x00007FFEC7AA0000-0x00007FFEC7AB7000-memory.dmp

    Filesize

    92KB

  • memory/1692-10-0x00007FFEC7AC0000-0x00007FFEC7AD1000-memory.dmp

    Filesize

    68KB

  • memory/1692-9-0x00007FFECBC70000-0x00007FFECBC87000-memory.dmp

    Filesize

    92KB

  • memory/1692-8-0x00007FFED5B80000-0x00007FFED5B98000-memory.dmp

    Filesize

    96KB

  • memory/1692-22-0x00007FFEBF570000-0x00007FFEBF581000-memory.dmp

    Filesize

    68KB

  • memory/1692-21-0x00007FFEC1550000-0x00007FFEC1561000-memory.dmp

    Filesize

    68KB

  • memory/1692-20-0x00007FFEC1570000-0x00007FFEC1581000-memory.dmp

    Filesize

    68KB

  • memory/1692-19-0x00007FFEC1590000-0x00007FFEC15A8000-memory.dmp

    Filesize

    96KB

  • memory/1692-18-0x00007FFEC15B0000-0x00007FFEC15D1000-memory.dmp

    Filesize

    132KB

  • memory/1692-17-0x00007FFEBF590000-0x00007FFEC0640000-memory.dmp

    Filesize

    16.7MB

  • memory/1692-35-0x00007FFEBF590000-0x00007FFEC0640000-memory.dmp

    Filesize

    16.7MB

  • memory/1692-53-0x00007FFEBF590000-0x00007FFEC0640000-memory.dmp

    Filesize

    16.7MB