Analysis

  • max time kernel
    144s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 04:31

General

  • Target

    mus/queen_intro.ogg

  • Size

    112KB

  • MD5

    08e53d5b016a575a801bdb9bcbdc5d31

  • SHA1

    1800a2cfd2b50575ec9fc8418d2acc584033306d

  • SHA256

    dfa6c5c95cdd4558804f407463ed3da1b16f07b31b2dc5ecf009e2dce6aef6f0

  • SHA512

    27608f49418fb2e24e9803826cc2101e770c44508f510ea491f2860e730a7301926de77e27884e5e6980743401d7fc2808374a6db9ba107841097037dc41c0ed

  • SSDEEP

    3072:WBZFCukkS5PQFxKuZphiFedzrxPmJ07Mb/T2GPZV0:WbfTxFPhi8fQT/T2GPZG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\mus\queen_intro.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\mus\queen_intro.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4104
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2ec 0x300
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4104-5-0x00007FF765700000-0x00007FF7657F8000-memory.dmp

          Filesize

          992KB

        • memory/4104-6-0x00007FFAAE210000-0x00007FFAAE244000-memory.dmp

          Filesize

          208KB

        • memory/4104-14-0x00007FFAAA8F0000-0x00007FFAAA901000-memory.dmp

          Filesize

          68KB

        • memory/4104-13-0x00007FFAB2450000-0x00007FFAB246D000-memory.dmp

          Filesize

          116KB

        • memory/4104-12-0x00007FFAB2A60000-0x00007FFAB2A71000-memory.dmp

          Filesize

          68KB

        • memory/4104-11-0x00007FFAB2A90000-0x00007FFAB2AA7000-memory.dmp

          Filesize

          92KB

        • memory/4104-10-0x00007FFAB2D80000-0x00007FFAB2D91000-memory.dmp

          Filesize

          68KB

        • memory/4104-9-0x00007FFAB2FB0000-0x00007FFAB2FC7000-memory.dmp

          Filesize

          92KB

        • memory/4104-8-0x00007FFAB3210000-0x00007FFAB3228000-memory.dmp

          Filesize

          96KB

        • memory/4104-7-0x00007FFAA3500000-0x00007FFAA37B6000-memory.dmp

          Filesize

          2.7MB

        • memory/4104-15-0x00007FFAA2DB0000-0x00007FFAA2FBB000-memory.dmp

          Filesize

          2.0MB

        • memory/4104-22-0x00007FFAA3FE0000-0x00007FFAA3FF1000-memory.dmp

          Filesize

          68KB

        • memory/4104-21-0x00007FFAA4DE0000-0x00007FFAA4DF1000-memory.dmp

          Filesize

          68KB

        • memory/4104-20-0x00007FFAA4E00000-0x00007FFAA4E11000-memory.dmp

          Filesize

          68KB

        • memory/4104-19-0x00007FFAAA210000-0x00007FFAAA228000-memory.dmp

          Filesize

          96KB

        • memory/4104-18-0x00007FFAAA8C0000-0x00007FFAAA8E1000-memory.dmp

          Filesize

          132KB

        • memory/4104-17-0x00007FFAAA230000-0x00007FFAAA271000-memory.dmp

          Filesize

          260KB

        • memory/4104-16-0x00007FFAA1D00000-0x00007FFAA2DB0000-memory.dmp

          Filesize

          16.7MB