Analysis
-
max time kernel
35s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/09/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
TokLom.rar
Resource
win11-20240802-en
11 signatures
1800 seconds
General
-
Target
TokLom.rar
-
Size
11KB
-
MD5
895f642ef590da8573c0e304f6ce6177
-
SHA1
ad39a7680fec2fb72aa5ca6ec4be13b9483d5b5f
-
SHA256
131bb7dad777b8f4c3857c10c3c6669a1eb936357fa205dbe0fff63c39265870
-
SHA512
3f87727fccec5bf018b0318dc2659ee5e76212ba776b123d28a57e18fa27e2456ff57ae2f5baadf443bdf1fe9f96d94cf5641e135be847cc83521c0195914491
-
SSDEEP
192:YAfrPEwz3zmwzMMILit6QG5KB7Tm/Q18UqZ8EVcxwOwe2OkwMS6recPCqfTigzQV:BP73bzoitdBvaaacQwDM9rRTJU
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3340 vlc.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3616 OpenWith.exe 3340 vlc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4324 taskmgr.exe Token: SeSystemProfilePrivilege 4324 taskmgr.exe Token: SeCreateGlobalPrivilege 4324 taskmgr.exe Token: 33 4324 taskmgr.exe Token: SeIncBasePriorityPrivilege 4324 taskmgr.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 3340 vlc.exe 3340 vlc.exe 3340 vlc.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 3340 vlc.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 3340 vlc.exe 3340 vlc.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 4324 taskmgr.exe 3340 vlc.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3616 OpenWith.exe 3340 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3616 wrote to memory of 3340 3616 OpenWith.exe 83 PID 3616 wrote to memory of 3340 3616 OpenWith.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TokLom.rar1⤵
- Modifies registry class
PID:2432
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\TokLom.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3340
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4324
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3128