Resubmissions

11-09-2024 18:46

240911-xe5y3swfpp 7

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 18:46

General

  • Target

    Dolby_Atmos_Setup_and_ControlPanel [PeskTop.com].rar

  • Size

    11.8MB

  • MD5

    389125e12835847cf559f0d797342db8

  • SHA1

    c9b9b9a1f0b673797254c3b30b32ff075401975b

  • SHA256

    e7540e416771a4532807a975e55c934110fd0d1f906d08a400b133e94bebe4c9

  • SHA512

    b8701fa9bd28dec31f620e0ccdd237b7317566b71b876535c1cff60266e9c77e5b6909b7d2a5053e354acc2bed885669f113e81d5170addb94602216fe64d00a

  • SSDEEP

    196608:DX815W0qNzvNdYk5axsXhwd5L6qljcKe6hrYO2xAeb9IxNlQwdBRNoRA5F+G1kY:DX815WTNdYDxowDLwKe6J8ieuxYmBRNt

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Dolby_Atmos_Setup_and_ControlPanel [PeskTop.com].rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Dolby_Atmos_Setup_and_ControlPanel [PeskTop.com].rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Dolby_Atmos_Setup_and_ControlPanel [PeskTop.com].rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Dolby_Atmos_Setup_and_ControlPanel [PeskTop.com].rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2672
  • C:\Windows\System32\control.exe
    "C:\Windows\System32\control.exe" SYSTEM
    1⤵
      PID:2832
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
      • System Location Discovery: System Language Discovery
      PID:2664
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1132

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1132-40-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/1132-41-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2672-37-0x000007FEFB640000-0x000007FEFB674000-memory.dmp

      Filesize

      208KB

    • memory/2672-36-0x000000013FF30000-0x0000000140028000-memory.dmp

      Filesize

      992KB

    • memory/2672-38-0x000007FEF68D0000-0x000007FEF6B86000-memory.dmp

      Filesize

      2.7MB

    • memory/2672-39-0x000007FEF5820000-0x000007FEF68D0000-memory.dmp

      Filesize

      16.7MB