Overview
overview
10Static
static
7gr7e2u08.rar
windows7-x64
3gr7e2u08.rar
windows10-2004-x64
3gr7e2u08/D...gs.vbs
windows7-x64
3gr7e2u08/D...gs.vbs
windows10-2004-x64
1gr7e2u08/ReadMe.txt
windows7-x64
1gr7e2u08/ReadMe.txt
windows10-2004-x64
1gr7e2u08/dControl.exe
windows7-x64
10gr7e2u08/dControl.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
gr7e2u08/dControl.ini
windows7-x64
1gr7e2u08/dControl.ini
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 13:01
Behavioral task
behavioral1
Sample
gr7e2u08.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
gr7e2u08.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
gr7e2u08/Defender_Settings.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
gr7e2u08/Defender_Settings.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
gr7e2u08/ReadMe.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
gr7e2u08/ReadMe.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
gr7e2u08/dControl.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
gr7e2u08/dControl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
gr7e2u08/dControl.ini
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
gr7e2u08/dControl.ini
Resource
win10v2004-20240802-en
General
-
Target
gr7e2u08.rar
-
Size
446KB
-
MD5
4f416671e1045824198b4608b51ab7e4
-
SHA1
4cb1d59215f53a35e12a99b9ffdea44902fe6c5a
-
SHA256
28aeaf7ce21b286c84d6462435bfeb60f97a57b875691dde4f2936b6c3f23684
-
SHA512
e7411a260707dcf13c8b6d0bb83670edc04dd218cf7081e3fbb86d911bfe62214f4791538914cb16eb630a8f0095d8bde59000b9df1fa8accb5f43bf12309862
-
SSDEEP
12288:kBxEZBLvr5YksjahgoOLWNTmgklG7XlXPdNxCvNLseMzzbMClm:CxE75xFQaN6G7xxClAFU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1688 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1688 vlc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1688 vlc.exe 1688 vlc.exe 1688 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1688 vlc.exe 1688 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1688 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2192 2160 cmd.exe 31 PID 2160 wrote to memory of 2192 2160 cmd.exe 31 PID 2160 wrote to memory of 2192 2160 cmd.exe 31 PID 2192 wrote to memory of 3024 2192 rundll32.exe 33 PID 2192 wrote to memory of 3024 2192 rundll32.exe 33 PID 2192 wrote to memory of 3024 2192 rundll32.exe 33 PID 3024 wrote to memory of 1688 3024 rundll32.exe 35 PID 3024 wrote to memory of 1688 3024 rundll32.exe 35 PID 3024 wrote to memory of 1688 3024 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gr7e2u08.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gr7e2u08.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gr7e2u08.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\gr7e2u08.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-