Resubmissions
03/09/2024, 06:58
240903-hrg1fszgpq 303/09/2024, 06:56
240903-hqmvba1gmg 303/09/2024, 06:52
240903-hm4nna1fpg 3Analysis
-
max time kernel
76s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
Tool.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Tool.rar
Resource
win10v2004-20240802-en
General
-
Target
Tool.rar
-
Size
30.3MB
-
MD5
07e35cbfc6611ab3992c940359271d79
-
SHA1
74ea5ed13ea7400d431472ac2b95d59d954e28a3
-
SHA256
51d50b014652cec1456ccde2de10ab057c59944de2b8596db39c04e8b6f27b34
-
SHA512
0ae9d57d030c341d75d60df24ccb8295ed8f599c42c5bc6c84984ff0d9a5fdc3fa59fca5dac7c93a8a1684181557e5143f9f2f3d3827fe612a0dec73f61032c9
-
SSDEEP
786432:T3fVM+Y4cslYNeOGbrJU5GrTtCgWvFWYpYdT4rpAzLFpQiZ0F7:rVWsoeNJUwnNWvFWYG4rpMpD0F7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1920 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1920 vlc.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe 1920 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1920 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1968 1184 cmd.exe 31 PID 1184 wrote to memory of 1968 1184 cmd.exe 31 PID 1184 wrote to memory of 1968 1184 cmd.exe 31 PID 1968 wrote to memory of 2836 1968 rundll32.exe 32 PID 1968 wrote to memory of 2836 1968 rundll32.exe 32 PID 1968 wrote to memory of 2836 1968 rundll32.exe 32 PID 2836 wrote to memory of 1920 2836 rundll32.exe 35 PID 2836 wrote to memory of 1920 2836 rundll32.exe 35 PID 2836 wrote to memory of 1920 2836 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Tool.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Tool.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Tool.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Tool.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD5c8ac3b01273c39cb4dfa98f85f33c573
SHA165fee45778fd3f1bf5a004e70f39923642ab500c
SHA256dcfc03b5d87d36317ffc03d7c5da2ecefe3d4825046806f72be50863b1f80f02
SHA512bb9d7151f2e717088cef2e88e20890df0bed339b250a27354e7f0009bc4f71c55bbcd8b1204cd6ce4ba2811fdf555d21e0d1f040edb8e4fbb8e1342df59dc43f