Analysis

  • max time kernel
    140s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 18:38

General

  • Target

    Blitz Hyper Edition FV Honey/chars/Amy/Files/Amy.snd

  • Size

    7.5MB

  • MD5

    ff3586b11af1b98fa9c7499a5a54c24d

  • SHA1

    c7ea9899f982a3271c53cc0bdcecd0074476c8cd

  • SHA256

    be79a3dd2ac4f81d1b1a63bf2ef4bc2d6edf7d0f7d8fee88f2830272990a6137

  • SHA512

    c245e0a80a33d85bf116a16e1907f0d5bc6e84547cd401602d2bd1b511cbb026535e2e0a38d25497a16e67abfe80168033bf72fbaa0ad5bc7beb46548e802618

  • SSDEEP

    196608:xb/TbTbTbT/bbT/T/T/Tb3DDbRBwwZCmHd+wzvLzVTm7wKjT8f:TlbzvVq75jTc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Blitz Hyper Edition FV Honey\chars\Amy\Files\Amy.snd"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4412-6-0x00007FFDFFEB0000-0x00007FFDFFEE4000-memory.dmp

    Filesize

    208KB

  • memory/4412-5-0x00007FF6688D0000-0x00007FF6689C8000-memory.dmp

    Filesize

    992KB

  • memory/4412-8-0x00007FFE03F60000-0x00007FFE03F78000-memory.dmp

    Filesize

    96KB

  • memory/4412-13-0x00007FFDFFE70000-0x00007FFDFFE8D000-memory.dmp

    Filesize

    116KB

  • memory/4412-12-0x00007FFDFFE90000-0x00007FFDFFEA1000-memory.dmp

    Filesize

    68KB

  • memory/4412-9-0x00007FFE021D0000-0x00007FFE021E7000-memory.dmp

    Filesize

    92KB

  • memory/4412-11-0x00007FFE00E90000-0x00007FFE00EA7000-memory.dmp

    Filesize

    92KB

  • memory/4412-10-0x00007FFE01870000-0x00007FFE01881000-memory.dmp

    Filesize

    68KB

  • memory/4412-7-0x00007FFDED590000-0x00007FFDED846000-memory.dmp

    Filesize

    2.7MB

  • memory/4412-15-0x00007FFDED110000-0x00007FFDED31B000-memory.dmp

    Filesize

    2.0MB

  • memory/4412-14-0x00007FFDFFE50000-0x00007FFDFFE61000-memory.dmp

    Filesize

    68KB

  • memory/4412-22-0x00007FFDFC130000-0x00007FFDFC141000-memory.dmp

    Filesize

    68KB

  • memory/4412-21-0x00007FFDFC150000-0x00007FFDFC161000-memory.dmp

    Filesize

    68KB

  • memory/4412-20-0x00007FFDFCA50000-0x00007FFDFCA61000-memory.dmp

    Filesize

    68KB

  • memory/4412-19-0x00007FFDFFE30000-0x00007FFDFFE48000-memory.dmp

    Filesize

    96KB

  • memory/4412-23-0x00007FFDED500000-0x00007FFDED55C000-memory.dmp

    Filesize

    368KB

  • memory/4412-18-0x00007FFDFC290000-0x00007FFDFC2B1000-memory.dmp

    Filesize

    132KB

  • memory/4412-17-0x00007FFDFC170000-0x00007FFDFC1B1000-memory.dmp

    Filesize

    260KB

  • memory/4412-16-0x00007FFDEC060000-0x00007FFDED110000-memory.dmp

    Filesize

    16.7MB

  • memory/4412-35-0x00007FFDEC060000-0x00007FFDED110000-memory.dmp

    Filesize

    16.7MB