Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 08:40

General

  • Target

    Hpp Hook v6 NOSTEAM.rar

  • Size

    549KB

  • MD5

    464e568996b188c24d49adc1d420c144

  • SHA1

    1148768640485a34b35ba00c843341d080339b86

  • SHA256

    43581d3f0fadd3829c5dc244fe66b9216991b55b854343fdc5e2ff620d383041

  • SHA512

    5fc3441901105007dfc5c4b4c14cb936fb6c6f9dc9b4dfd4b72930e51a28d03bb94cabadb90aad45683a9f0d0b215fbe39741d586271b9fb594df185d1d1b8b8

  • SSDEEP

    12288:h0ipTXXJyCJxCW6JnxcIEHhqjzG/v2nzCbhJfnMY9Jn:hJbJyKx96bcIEnEebhJkOB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Hpp Hook v6 NOSTEAM.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hpp Hook v6 NOSTEAM.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hpp Hook v6 NOSTEAM.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Hpp Hook v6 NOSTEAM.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2612-32-0x000007FEF6500000-0x000007FEF6534000-memory.dmp

    Filesize

    208KB

  • memory/2612-31-0x000000013F7F0000-0x000000013F8E8000-memory.dmp

    Filesize

    992KB

  • memory/2612-35-0x000007FEF60F0000-0x000007FEF6107000-memory.dmp

    Filesize

    92KB

  • memory/2612-40-0x000007FEF6050000-0x000007FEF6061000-memory.dmp

    Filesize

    68KB

  • memory/2612-39-0x000007FEF6070000-0x000007FEF608D000-memory.dmp

    Filesize

    116KB

  • memory/2612-38-0x000007FEF6090000-0x000007FEF60A1000-memory.dmp

    Filesize

    68KB

  • memory/2612-37-0x000007FEF60B0000-0x000007FEF60C7000-memory.dmp

    Filesize

    92KB

  • memory/2612-36-0x000007FEF60D0000-0x000007FEF60E1000-memory.dmp

    Filesize

    68KB

  • memory/2612-33-0x000007FEF6240000-0x000007FEF64F6000-memory.dmp

    Filesize

    2.7MB

  • memory/2612-34-0x000007FEF8320000-0x000007FEF8338000-memory.dmp

    Filesize

    96KB

  • memory/2612-60-0x000007FEF49E0000-0x000007FEF4A03000-memory.dmp

    Filesize

    140KB

  • memory/2612-62-0x000007FEF49A0000-0x000007FEF49B2000-memory.dmp

    Filesize

    72KB

  • memory/2612-61-0x000007FEF49C0000-0x000007FEF49D1000-memory.dmp

    Filesize

    68KB

  • memory/2612-59-0x000007FEF4A10000-0x000007FEF4A28000-memory.dmp

    Filesize

    96KB

  • memory/2612-58-0x000007FEF4A30000-0x000007FEF4A54000-memory.dmp

    Filesize

    144KB

  • memory/2612-57-0x000007FEF4A60000-0x000007FEF4A88000-memory.dmp

    Filesize

    160KB

  • memory/2612-56-0x000007FEF4A90000-0x000007FEF4AE7000-memory.dmp

    Filesize

    348KB

  • memory/2612-55-0x000007FEF4AF0000-0x000007FEF4B01000-memory.dmp

    Filesize

    68KB

  • memory/2612-54-0x000007FEF4B10000-0x000007FEF4B8C000-memory.dmp

    Filesize

    496KB

  • memory/2612-53-0x000007FEF4B90000-0x000007FEF4BF7000-memory.dmp

    Filesize

    412KB

  • memory/2612-52-0x000007FEF4C00000-0x000007FEF4C30000-memory.dmp

    Filesize

    192KB

  • memory/2612-51-0x000007FEF4C30000-0x000007FEF4C48000-memory.dmp

    Filesize

    96KB

  • memory/2612-50-0x000007FEF4C50000-0x000007FEF4C61000-memory.dmp

    Filesize

    68KB

  • memory/2612-49-0x000007FEF4C70000-0x000007FEF4C8B000-memory.dmp

    Filesize

    108KB

  • memory/2612-48-0x000007FEF4C90000-0x000007FEF4CA1000-memory.dmp

    Filesize

    68KB

  • memory/2612-47-0x000007FEF4CB0000-0x000007FEF4CC1000-memory.dmp

    Filesize

    68KB

  • memory/2612-46-0x000007FEF4CD0000-0x000007FEF4CE1000-memory.dmp

    Filesize

    68KB

  • memory/2612-45-0x000007FEF4CF0000-0x000007FEF4D08000-memory.dmp

    Filesize

    96KB

  • memory/2612-44-0x000007FEF4D10000-0x000007FEF4D31000-memory.dmp

    Filesize

    132KB

  • memory/2612-43-0x000007FEF4D40000-0x000007FEF4D81000-memory.dmp

    Filesize

    260KB

  • memory/2612-41-0x000007FEF4FA0000-0x000007FEF6050000-memory.dmp

    Filesize

    16.7MB

  • memory/2612-42-0x000007FEF4D90000-0x000007FEF4F9B000-memory.dmp

    Filesize

    2.0MB