Analysis
-
max time kernel
594s -
max time network
367s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸/⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸/⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar
Resource
win10v2004-20240802-en
General
-
Target
⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸/⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar
-
Size
20.2MB
-
MD5
b0088132e07006d811fa0cad898b64c1
-
SHA1
21aa01005fe6e9c53c030bca59250ab88c301a5f
-
SHA256
2cd7984b6226f9fe5542b6083e2552b37df78b9160e1549ee330a96f93ac2ffc
-
SHA512
30235cb2e9d6fb1085f943a0f8a4e33c153e79262258d149383014d6e402fb4d076d7024c829eb48465b0bbb79a7ae3dd357c8c7620eea954767d3f04a1ff6eb
-
SSDEEP
393216:nHmG4h93kkgugoJOUHDthdTT7V/tDYMyveikAGO9DcT2:G7hyBugqTT/H6nGOFs2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1664 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1664 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe 1664 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1664 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2776 2092 cmd.exe 31 PID 2092 wrote to memory of 2776 2092 cmd.exe 31 PID 2092 wrote to memory of 2776 2092 cmd.exe 31 PID 2776 wrote to memory of 2600 2776 rundll32.exe 32 PID 2776 wrote to memory of 2600 2776 rundll32.exe 32 PID 2776 wrote to memory of 2600 2776 rundll32.exe 32 PID 2600 wrote to memory of 1664 2600 rundll32.exe 34 PID 2600 wrote to memory of 1664 2600 rundll32.exe 34 PID 2600 wrote to memory of 1664 2600 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
-