Analysis

  • max time kernel
    594s
  • max time network
    367s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 19:17

General

  • Target

    ⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸/⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar

  • Size

    20.2MB

  • MD5

    b0088132e07006d811fa0cad898b64c1

  • SHA1

    21aa01005fe6e9c53c030bca59250ab88c301a5f

  • SHA256

    2cd7984b6226f9fe5542b6083e2552b37df78b9160e1549ee330a96f93ac2ffc

  • SHA512

    30235cb2e9d6fb1085f943a0f8a4e33c153e79262258d149383014d6e402fb4d076d7024c829eb48465b0bbb79a7ae3dd357c8c7620eea954767d3f04a1ff6eb

  • SSDEEP

    393216:nHmG4h93kkgugoJOUHDthdTT7V/tDYMyveikAGO9DcT2:G7hyBugqTT/H6nGOFs2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸\⟹-ⓞ#ⓞLa-t-e$-st-#-Se-t-up-#-PAs$sc0dE-#ⓞ9192ⓞ#-⟸.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-30-0x000007FEFAF10000-0x000007FEFAF44000-memory.dmp

    Filesize

    208KB

  • memory/1664-29-0x000000013F900000-0x000000013F9F8000-memory.dmp

    Filesize

    992KB

  • memory/1664-32-0x000007FEFAF80000-0x000007FEFAF98000-memory.dmp

    Filesize

    96KB

  • memory/1664-33-0x000007FEFAEF0000-0x000007FEFAF07000-memory.dmp

    Filesize

    92KB

  • memory/1664-31-0x000007FEF6520000-0x000007FEF67D6000-memory.dmp

    Filesize

    2.7MB

  • memory/1664-34-0x000007FEFAED0000-0x000007FEFAEE1000-memory.dmp

    Filesize

    68KB

  • memory/1664-35-0x000007FEFAEB0000-0x000007FEFAEC7000-memory.dmp

    Filesize

    92KB

  • memory/1664-36-0x000007FEFACC0000-0x000007FEFACD1000-memory.dmp

    Filesize

    68KB

  • memory/1664-37-0x000007FEFACA0000-0x000007FEFACBD000-memory.dmp

    Filesize

    116KB

  • memory/1664-38-0x000007FEFAB30000-0x000007FEFAB41000-memory.dmp

    Filesize

    68KB

  • memory/1664-39-0x000007FEF6310000-0x000007FEF651B000-memory.dmp

    Filesize

    2.0MB

  • memory/1664-41-0x000007FEFAAE0000-0x000007FEFAB21000-memory.dmp

    Filesize

    260KB

  • memory/1664-42-0x000007FEFAAB0000-0x000007FEFAAD1000-memory.dmp

    Filesize

    132KB

  • memory/1664-43-0x000007FEFAA90000-0x000007FEFAAA8000-memory.dmp

    Filesize

    96KB

  • memory/1664-44-0x000007FEF7D10000-0x000007FEF7D21000-memory.dmp

    Filesize

    68KB

  • memory/1664-45-0x000007FEF7CF0000-0x000007FEF7D01000-memory.dmp

    Filesize

    68KB

  • memory/1664-46-0x000007FEF7CD0000-0x000007FEF7CE1000-memory.dmp

    Filesize

    68KB

  • memory/1664-56-0x000007FEF6C20000-0x000007FEF6C44000-memory.dmp

    Filesize

    144KB

  • memory/1664-61-0x000007FEFAD80000-0x000007FEFADA1000-memory.dmp

    Filesize

    132KB

  • memory/1664-60-0x000007FEF6B90000-0x000007FEF6BA2000-memory.dmp

    Filesize

    72KB

  • memory/1664-59-0x000007FEF6BB0000-0x000007FEF6BC1000-memory.dmp

    Filesize

    68KB

  • memory/1664-58-0x000007FEF6BD0000-0x000007FEF6BF3000-memory.dmp

    Filesize

    140KB

  • memory/1664-57-0x000007FEF6C00000-0x000007FEF6C18000-memory.dmp

    Filesize

    96KB

  • memory/1664-55-0x000007FEF7120000-0x000007FEF7148000-memory.dmp

    Filesize

    160KB

  • memory/1664-54-0x000007FEF6C50000-0x000007FEF6CA7000-memory.dmp

    Filesize

    348KB

  • memory/1664-53-0x000007FEF7150000-0x000007FEF7161000-memory.dmp

    Filesize

    68KB

  • memory/1664-40-0x000007FEF5260000-0x000007FEF6310000-memory.dmp

    Filesize

    16.7MB

  • memory/1664-51-0x000007FEF71F0000-0x000007FEF7257000-memory.dmp

    Filesize

    412KB

  • memory/1664-50-0x000007FEF7260000-0x000007FEF7290000-memory.dmp

    Filesize

    192KB

  • memory/1664-49-0x000007FEF7290000-0x000007FEF72A8000-memory.dmp

    Filesize

    96KB

  • memory/1664-48-0x000007FEF72B0000-0x000007FEF72C1000-memory.dmp

    Filesize

    68KB

  • memory/1664-47-0x000007FEF7CB0000-0x000007FEF7CCB000-memory.dmp

    Filesize

    108KB

  • memory/1664-52-0x000007FEF7170000-0x000007FEF71EC000-memory.dmp

    Filesize

    496KB

  • memory/1664-62-0x000007FEFAD60000-0x000007FEFAD71000-memory.dmp

    Filesize

    68KB

  • memory/1664-63-0x000007FEFAF70000-0x000007FEFAF80000-memory.dmp

    Filesize

    64KB

  • memory/1664-64-0x000007FEFAD10000-0x000007FEFAD3F000-memory.dmp

    Filesize

    188KB

  • memory/1664-65-0x000007FEFACF0000-0x000007FEFAD01000-memory.dmp

    Filesize

    68KB

  • memory/1664-66-0x000007FEF2C60000-0x000007FEF2C76000-memory.dmp

    Filesize

    88KB

  • memory/1664-67-0x000007FEF2B90000-0x000007FEF2C55000-memory.dmp

    Filesize

    788KB

  • memory/1664-68-0x000007FEF2B40000-0x000007FEF2B82000-memory.dmp

    Filesize

    264KB

  • memory/1664-69-0x000007FEF2AD0000-0x000007FEF2B32000-memory.dmp

    Filesize

    392KB

  • memory/1664-70-0x000007FEF2A60000-0x000007FEF2ACD000-memory.dmp

    Filesize

    436KB