Analysis

  • max time kernel
    143s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 02:33

General

  • Target

    0 Mouse Delay + Input Delay.rar

  • Size

    3.0MB

  • MD5

    0c528e3b045c5ab227f5eafddddd801b

  • SHA1

    7cee0f0b1a21714d24ae80c214614df116228f43

  • SHA256

    b36314ddd6a40030323302f2566d2bd73dce793c7f47a4a1ed2f76025c1c8afc

  • SHA512

    e7c412af691b02fc52c8be76f0410df8096b93a1b9aadcca034f30bdb40986a7149f402af4d87e5e6896288b696bbdd1ffbb6ff884af2340098e18ea6cbd1d7d

  • SSDEEP

    49152:6NTztXrN1e+ruNNmFIVQY068frKe1z/WWloIIy8zBofzDua8bJSa9/E1FHhfWJN6:6N1b/e+ruHq4068frKIz/WxIVkofz/o+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2684-25-0x000007FEFAE50000-0x000007FEFAE84000-memory.dmp

          Filesize

          208KB

        • memory/2684-24-0x000000013FE50000-0x000000013FF48000-memory.dmp

          Filesize

          992KB

        • memory/2684-28-0x000007FEFAE10000-0x000007FEFAE27000-memory.dmp

          Filesize

          92KB

        • memory/2684-31-0x000007FEF79E0000-0x000007FEF79F1000-memory.dmp

          Filesize

          68KB

        • memory/2684-33-0x000007FEF7720000-0x000007FEF7731000-memory.dmp

          Filesize

          68KB

        • memory/2684-32-0x000007FEF7740000-0x000007FEF775D000-memory.dmp

          Filesize

          116KB

        • memory/2684-30-0x000007FEFADD0000-0x000007FEFADE7000-memory.dmp

          Filesize

          92KB

        • memory/2684-29-0x000007FEFADF0000-0x000007FEFAE01000-memory.dmp

          Filesize

          68KB

        • memory/2684-26-0x000007FEF5F30000-0x000007FEF61E6000-memory.dmp

          Filesize

          2.7MB

        • memory/2684-27-0x000007FEFAE30000-0x000007FEFAE48000-memory.dmp

          Filesize

          96KB

        • memory/2684-34-0x000007FEF5A00000-0x000007FEF5C0B000-memory.dmp

          Filesize

          2.0MB

        • memory/2684-46-0x000007FEF48B0000-0x000007FEF4917000-memory.dmp

          Filesize

          412KB

        • memory/2684-35-0x000007FEF4950000-0x000007FEF5A00000-memory.dmp

          Filesize

          16.7MB

        • memory/2684-55-0x000007FEF46C0000-0x000007FEF46D2000-memory.dmp

          Filesize

          72KB

        • memory/2684-54-0x000007FEF46E0000-0x000007FEF46F1000-memory.dmp

          Filesize

          68KB

        • memory/2684-53-0x000007FEF4700000-0x000007FEF4723000-memory.dmp

          Filesize

          140KB

        • memory/2684-52-0x000007FEF4730000-0x000007FEF4748000-memory.dmp

          Filesize

          96KB

        • memory/2684-51-0x000007FEF4750000-0x000007FEF4774000-memory.dmp

          Filesize

          144KB

        • memory/2684-50-0x000007FEF4780000-0x000007FEF47A8000-memory.dmp

          Filesize

          160KB

        • memory/2684-49-0x000007FEF47B0000-0x000007FEF4807000-memory.dmp

          Filesize

          348KB

        • memory/2684-48-0x000007FEF4810000-0x000007FEF4821000-memory.dmp

          Filesize

          68KB

        • memory/2684-47-0x000007FEF4830000-0x000007FEF48AC000-memory.dmp

          Filesize

          496KB

        • memory/2684-45-0x000007FEF4920000-0x000007FEF4950000-memory.dmp

          Filesize

          192KB

        • memory/2684-44-0x000007FEF6570000-0x000007FEF6588000-memory.dmp

          Filesize

          96KB

        • memory/2684-43-0x000007FEF6590000-0x000007FEF65A1000-memory.dmp

          Filesize

          68KB

        • memory/2684-42-0x000007FEF65B0000-0x000007FEF65CB000-memory.dmp

          Filesize

          108KB

        • memory/2684-41-0x000007FEF6B80000-0x000007FEF6B91000-memory.dmp

          Filesize

          68KB

        • memory/2684-40-0x000007FEF6BA0000-0x000007FEF6BB1000-memory.dmp

          Filesize

          68KB

        • memory/2684-39-0x000007FEF6BC0000-0x000007FEF6BD1000-memory.dmp

          Filesize

          68KB

        • memory/2684-38-0x000007FEF7700000-0x000007FEF7718000-memory.dmp

          Filesize

          96KB

        • memory/2684-37-0x000007FEF6BE0000-0x000007FEF6C01000-memory.dmp

          Filesize

          132KB

        • memory/2684-36-0x000007FEF6C10000-0x000007FEF6C51000-memory.dmp

          Filesize

          260KB