Overview
overview
7Static
static
1rosearch-chrome.rar
windows7-x64
3rosearch-chrome.rar
windows10-2004-x64
3rosearch-c...on.png
windows7-x64
3rosearch-c...on.png
windows10-2004-x64
3rosearch-c...t.json
windows7-x64
3rosearch-c...t.json
windows10-2004-x64
3rosearch-c...gin.js
windows7-x64
3rosearch-c...gin.js
windows10-2004-x64
3rosearch-c...es.css
windows7-x64
3rosearch-c...es.css
windows10-2004-x64
7Analysis
-
max time kernel
143s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
rosearch-chrome.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rosearch-chrome.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
rosearch-chrome/icon.png
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rosearch-chrome/icon.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
rosearch-chrome/manifest.json
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
rosearch-chrome/manifest.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
rosearch-chrome/plugin.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
rosearch-chrome/plugin.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
rosearch-chrome/styles.css
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
rosearch-chrome/styles.css
Resource
win10v2004-20240802-en
General
-
Target
rosearch-chrome.rar
-
Size
8KB
-
MD5
add095c6e7d1d807288dac06fbee2ee2
-
SHA1
90acae65c9b04dc8fb6f78b565e2f8a048ff3de1
-
SHA256
07889c104eecd5296bfee588ec12a177ea8c5a7b57c87360386fe97cd088c288
-
SHA512
9b860052371a1f3d12dc4492a78d9137ae96b874d3ff3b534c73c1986a4371fba1f473468431c9ae8e14542c1f109c044af80552a69f682453731a1a4245039c
-
SSDEEP
192:UAlNBxBwGxjztxD/0QKPd1OZPbACsPMFyvhCpmH:bnBAGlztx7JKj6c3UcCpG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1500 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1500 vlc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1500 vlc.exe 1500 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1500 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2728 2676 cmd.exe 32 PID 2676 wrote to memory of 2728 2676 cmd.exe 32 PID 2676 wrote to memory of 2728 2676 cmd.exe 32 PID 2728 wrote to memory of 2568 2728 rundll32.exe 33 PID 2728 wrote to memory of 2568 2728 rundll32.exe 33 PID 2728 wrote to memory of 2568 2728 rundll32.exe 33 PID 2568 wrote to memory of 1500 2568 rundll32.exe 35 PID 2568 wrote to memory of 1500 2568 rundll32.exe 35 PID 2568 wrote to memory of 1500 2568 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\rosearch-chrome.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rosearch-chrome.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rosearch-chrome.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\rosearch-chrome.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
-