Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 04:31

General

  • Target

    mus/rouxls_battle.ogg

  • Size

    702KB

  • MD5

    15fa8876e7cad54d1033bb6ee237c9ae

  • SHA1

    bd2a10322d046babd488902e9f70aa6c190a88e6

  • SHA256

    c502041d7170d1b8511adb33cd7a2ecae5eb1bff2130acf26881cf43a2e31cd9

  • SHA512

    e698cf2888f9ba97c8699482d766cea15681f92d54c4f399935b2c465f239b4204fb545a0183433cfa7adb8facf2467a71c0aa022e7aa29700a5d85113c53039

  • SSDEEP

    12288:ma76m48gC5a65Gm7oVcNNH8sfgXX6v6/zicsG5p6wBw1lOg+uBa2sW7Hu94vRB:m+6ZsGm7TA685p6wBwDu9q

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\mus\rouxls_battle.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\mus\rouxls_battle.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4736
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4cc 0x308
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4736-6-0x00007FFD10100000-0x00007FFD10134000-memory.dmp

          Filesize

          208KB

        • memory/4736-5-0x00007FF68DA10000-0x00007FF68DB08000-memory.dmp

          Filesize

          992KB

        • memory/4736-14-0x00007FFD0FF00000-0x00007FFD0FF11000-memory.dmp

          Filesize

          68KB

        • memory/4736-13-0x00007FFD0FF20000-0x00007FFD0FF3D000-memory.dmp

          Filesize

          116KB

        • memory/4736-12-0x00007FFD0FF40000-0x00007FFD0FF51000-memory.dmp

          Filesize

          68KB

        • memory/4736-7-0x00007FFCFFE10000-0x00007FFD000C6000-memory.dmp

          Filesize

          2.7MB

        • memory/4736-11-0x00007FFD10090000-0x00007FFD100A7000-memory.dmp

          Filesize

          92KB

        • memory/4736-15-0x00007FFCFFA10000-0x00007FFCFFC1B000-memory.dmp

          Filesize

          2.0MB

        • memory/4736-10-0x00007FFD100B0000-0x00007FFD100C1000-memory.dmp

          Filesize

          68KB

        • memory/4736-9-0x00007FFD13680000-0x00007FFD13697000-memory.dmp

          Filesize

          92KB

        • memory/4736-8-0x00007FFD187B0000-0x00007FFD187C8000-memory.dmp

          Filesize

          96KB

        • memory/4736-22-0x00007FFD06980000-0x00007FFD06991000-memory.dmp

          Filesize

          68KB

        • memory/4736-21-0x00007FFD06FE0000-0x00007FFD06FF1000-memory.dmp

          Filesize

          68KB

        • memory/4736-20-0x00007FFD0BD80000-0x00007FFD0BD91000-memory.dmp

          Filesize

          68KB

        • memory/4736-16-0x00007FFCFE960000-0x00007FFCFFA10000-memory.dmp

          Filesize

          16.7MB

        • memory/4736-19-0x00007FFD0BDA0000-0x00007FFD0BDB8000-memory.dmp

          Filesize

          96KB

        • memory/4736-18-0x00007FFD0C300000-0x00007FFD0C321000-memory.dmp

          Filesize

          132KB

        • memory/4736-17-0x00007FFD0F820000-0x00007FFD0F861000-memory.dmp

          Filesize

          260KB

        • memory/4736-34-0x00007FFCFE960000-0x00007FFCFFA10000-memory.dmp

          Filesize

          16.7MB