Resubmissions
01-11-2024 12:33
241101-pradyaypdv 1027-10-2024 23:08
241027-24hmasskhj 1020-10-2024 16:28
241020-tyzdvsxgqb 320-10-2024 16:26
241020-tx2gtszekk 302-10-2024 11:53
241002-n2j6fsycqb 313-09-2024 04:59
240913-fmwxpswcpb 311-09-2024 15:54
240911-tcmg6sygmm 311-09-2024 15:53
240911-tbsmsszbnh 1025-08-2024 22:53
240825-2t6als1gll 10Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-09-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
dl2.exe
Resource
win11-20240802-en
General
-
Target
dl2.exe
-
Size
849KB
-
MD5
c2055b7fbaa041d9f68b9d5df9b45edd
-
SHA1
e4bd443bd4ce9029290dcd4bb47cb1a01f3b1b06
-
SHA256
342f04c4720590c40d24078d46d9b19d8175565f0af460598171d58f5ffc48f3
-
SHA512
18905b75938b8af9468b1aa3ffbae796a139c2762e623aa6ffb9ec2b293dd04aa1f90d1ed5a7dbda7853795a3688e368121a134c7f63e527a8e5e7679301a1dc
-
SSDEEP
12288:A3RY3yNqMRTF4q2rxHn2ot/81xpNQyjUXlmoe7ufjHAtjXD7r2:A3RY3R24q+xn/8Xp2yOl5fzQ/2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2892 vlc.exe 1356 WINWORD.EXE 1356 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2892 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe 2892 vlc.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2876 dl2.exe 4820 dl2.exe 2892 vlc.exe 1356 WINWORD.EXE 1356 WINWORD.EXE 1356 WINWORD.EXE 1356 WINWORD.EXE 1356 WINWORD.EXE 1356 WINWORD.EXE 1356 WINWORD.EXE 1356 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\dl2.exe"C:\Users\Admin\AppData\Local\Temp\dl2.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2876
-
C:\Users\Admin\AppData\Local\Temp\dl2.exeC:\Users\Admin\AppData\Local\Temp\dl2.exe {E912DEC8-B93E-44AF-A5D0-3354DCFD132A}1⤵
- Suspicious use of SetWindowsHookEx
PID:4820
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SaveInitialize.3g2"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2892
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ResumeMount.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383B
MD583fd46c0ec8fa7a17af7f2fa35c90b5b
SHA189236fb68edb9a16c5d159ad4e8b77aac838c2e9
SHA256be45c53a3db8c50cdc1ce818dac95a32cf33583af5fbae2beef3bb54e829467c
SHA5129b065d51eb044a4f505e31bc73878cbbb2d2783aea50d5d46468416ec96134e9cf86eb27b2190d1f9c4977be58fe6a678eb9683512276096e06ab26fccd85778
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57d1daf090d3112a284c3e8083f7b0132
SHA10bd0cf16a1c08529e5b8c1b1bb3bbe672d872e15
SHA2563b8fa168da77dc526bdae9367cfad86c06e9dcfd7d873b946a184442f1f820fb
SHA512bd2e27259b454c85c7d5a68793cf3b1a1f730da1807aa63f27b648873e57cfea1dda0380ba6357d4e31e2a704ddbb8914ad7356f470227d257f08b6c4aa01c36