Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
astro pass 1.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
astro pass 1.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
password 1.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
password 1.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
пароль 1.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
пароль 1.txt
Resource
win10v2004-20240802-en
General
-
Target
astro pass 1.rar
-
Size
12.4MB
-
MD5
dfb5a5ef9fe9d09ae521fec5e2f54ecf
-
SHA1
689ea335575a8312d6091eb99f5afa3f4bc01880
-
SHA256
baa33659646ea9a4d713d5046233a631587a399099cfc45a55439332e1675de1
-
SHA512
319fce64195387e1fda76e35febf8c246fa3d0da36e8fd64145bd8b50dbc9e28ff200d71e776edf0cd5fdfc13930fbf82d1b407ea08e3dcd647b4f1fdda0c768
-
SSDEEP
393216:p2Qomebw7KckTX47nWgUdrKPKQrt2SBoRVIWSUE+ehBiNPfdUQXvKV:sQopkKcg47WgoBQrtnORVI3UE+e8pv2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2600 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 vlc.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe 2600 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2600 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2080 2248 cmd.exe 31 PID 2248 wrote to memory of 2080 2248 cmd.exe 31 PID 2248 wrote to memory of 2080 2248 cmd.exe 31 PID 2080 wrote to memory of 2264 2080 rundll32.exe 33 PID 2080 wrote to memory of 2264 2080 rundll32.exe 33 PID 2080 wrote to memory of 2264 2080 rundll32.exe 33 PID 2264 wrote to memory of 2600 2264 rundll32.exe 35 PID 2264 wrote to memory of 2600 2264 rundll32.exe 35 PID 2264 wrote to memory of 2600 2264 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\astro pass 1.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\astro pass 1.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\astro pass 1.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\astro pass 1.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD51665a1f58eea70425af5b552b235b4da
SHA14084f4f06826955d9d13e64eb2bd944356ef9271
SHA256f34346d35f8ba29cfcc9313beb949a583a8c0fe4b846cb8b1c8570cff19fe146
SHA512219da6be4c0eeb6a5603abee62b4c63a5714662a3d7216253ce0ce910460b818dbaa23aacfc01b121ca23ddb967ebbc3741ff4a7eefcbd9f3265e581d47693c6