Analysis

  • max time kernel
    17s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 17:18

General

  • Target

    Ulpack (1).rar

  • Size

    3.2MB

  • MD5

    154bd809bd02c3b4fbd05d7511368da1

  • SHA1

    37916e2931143a9174c290388104876395eac823

  • SHA256

    707c2e42a80f88f5dcaaf1bd63b2e93dd4503eaf4a6fd497c5d4cc6de3b16255

  • SHA512

    18e2e58e5496a499e4a7d69a347fda4eb437b757ad8f4767f861ecfbbd22d0f070efd36249af43addbb45755e514f9449966abaa9c6f78a536f4f74f6e24913a

  • SSDEEP

    98304:45HWD5p/hwYMtYtzz/3+kvPRAvh4pfBjD:452V0Ynzz/rvPRApGD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Ulpack (1).rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Ulpack (1).rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Ulpack (1).rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Ulpack (1).rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1540-29-0x000000013F900000-0x000000013F9F8000-memory.dmp

    Filesize

    992KB

  • memory/1540-30-0x000007FEF5160000-0x000007FEF5194000-memory.dmp

    Filesize

    208KB

  • memory/1540-32-0x000007FEFABE0000-0x000007FEFABF8000-memory.dmp

    Filesize

    96KB

  • memory/1540-33-0x000007FEF74B0000-0x000007FEF74C7000-memory.dmp

    Filesize

    92KB

  • memory/1540-31-0x000007FEF4EA0000-0x000007FEF5156000-memory.dmp

    Filesize

    2.7MB

  • memory/1540-34-0x000007FEF6300000-0x000007FEF6311000-memory.dmp

    Filesize

    68KB

  • memory/1540-35-0x000007FEF4D50000-0x000007FEF4D67000-memory.dmp

    Filesize

    92KB

  • memory/1540-36-0x000007FEF4D30000-0x000007FEF4D41000-memory.dmp

    Filesize

    68KB

  • memory/1540-37-0x000007FEF4D10000-0x000007FEF4D2D000-memory.dmp

    Filesize

    116KB

  • memory/1540-38-0x000007FEF4CF0000-0x000007FEF4D01000-memory.dmp

    Filesize

    68KB

  • memory/1540-40-0x000007FEF3A30000-0x000007FEF3C3B000-memory.dmp

    Filesize

    2.0MB

  • memory/1540-39-0x000007FEF3C40000-0x000007FEF4CF0000-memory.dmp

    Filesize

    16.7MB

  • memory/1540-41-0x000007FEF39E0000-0x000007FEF3A21000-memory.dmp

    Filesize

    260KB

  • memory/1540-42-0x000007FEF39B0000-0x000007FEF39D1000-memory.dmp

    Filesize

    132KB

  • memory/1540-43-0x000007FEF3990000-0x000007FEF39A8000-memory.dmp

    Filesize

    96KB

  • memory/1540-44-0x000007FEF3970000-0x000007FEF3981000-memory.dmp

    Filesize

    68KB

  • memory/1540-45-0x000007FEF3950000-0x000007FEF3961000-memory.dmp

    Filesize

    68KB

  • memory/1540-46-0x000007FEF3930000-0x000007FEF3941000-memory.dmp

    Filesize

    68KB

  • memory/1540-47-0x000007FEF3910000-0x000007FEF392B000-memory.dmp

    Filesize

    108KB

  • memory/1540-48-0x000007FEF38F0000-0x000007FEF3901000-memory.dmp

    Filesize

    68KB

  • memory/1540-49-0x000007FEF38D0000-0x000007FEF38E8000-memory.dmp

    Filesize

    96KB

  • memory/1540-50-0x000007FEF38A0000-0x000007FEF38D0000-memory.dmp

    Filesize

    192KB

  • memory/1540-51-0x000007FEF3830000-0x000007FEF3897000-memory.dmp

    Filesize

    412KB

  • memory/1540-55-0x000007FEF3700000-0x000007FEF3728000-memory.dmp

    Filesize

    160KB

  • memory/1540-56-0x000007FEF36D0000-0x000007FEF36F4000-memory.dmp

    Filesize

    144KB

  • memory/1540-54-0x000007FEF3730000-0x000007FEF3787000-memory.dmp

    Filesize

    348KB

  • memory/1540-53-0x000007FEF3790000-0x000007FEF37A1000-memory.dmp

    Filesize

    68KB

  • memory/1540-57-0x000007FEF36B0000-0x000007FEF36C8000-memory.dmp

    Filesize

    96KB

  • memory/1540-52-0x000007FEF37B0000-0x000007FEF382C000-memory.dmp

    Filesize

    496KB

  • memory/1540-59-0x000007FEF3660000-0x000007FEF3671000-memory.dmp

    Filesize

    68KB

  • memory/1540-58-0x000007FEF3680000-0x000007FEF36A3000-memory.dmp

    Filesize

    140KB

  • memory/1540-60-0x000007FEF3640000-0x000007FEF3652000-memory.dmp

    Filesize

    72KB