Resubmissions

19-09-2024 07:29

240919-jbcapsxeqk 7

19-09-2024 07:27

240919-jaa19axcje 7

19-09-2024 07:21

240919-h66x5axanb 7

19-09-2024 07:04

240919-hwcxaswenh 7

19-09-2024 07:04

240919-hv496awend 3

19-09-2024 07:00

240919-hs4kvawfqr 3

Analysis

  • max time kernel
    143s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 07:00

General

  • Target

    123.rar

  • Size

    4.3MB

  • MD5

    d2d30eb66c8919cb33dd969b3aaff546

  • SHA1

    2719e1527820a076c540f40b4342be09b2e1b66e

  • SHA256

    57d0aa2a1d890f1b58a8b361c7cc2e1ef1829743f9e68a17e0e076b24ee6cb93

  • SHA512

    3fcd0721272d09575452b672bc824a915efe32c9fb72e3357ab00c19b52d91079c02f62096d3b665f607f2afedcdff1f4c82f6e849204a30e28bc7af0d46ec6d

  • SSDEEP

    98304:gCdtJmBbsufP6iry6PXnMtWNQrMob5rJB+n2lb:gCd/0bLfPb26f8QgrJVlb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\123.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\123.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\123.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\123.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/584-30-0x000007FEFA8E0000-0x000007FEFA914000-memory.dmp

    Filesize

    208KB

  • memory/584-29-0x000000013FBC0000-0x000000013FCB8000-memory.dmp

    Filesize

    992KB

  • memory/584-32-0x000007FEFA8C0000-0x000007FEFA8D8000-memory.dmp

    Filesize

    96KB

  • memory/584-34-0x000007FEFA880000-0x000007FEFA891000-memory.dmp

    Filesize

    68KB

  • memory/584-33-0x000007FEFA8A0000-0x000007FEFA8B7000-memory.dmp

    Filesize

    92KB

  • memory/584-35-0x000007FEFA860000-0x000007FEFA877000-memory.dmp

    Filesize

    92KB

  • memory/584-36-0x000007FEF7CC0000-0x000007FEF7CD1000-memory.dmp

    Filesize

    68KB

  • memory/584-37-0x000007FEF6F00000-0x000007FEF6F1D000-memory.dmp

    Filesize

    116KB

  • memory/584-38-0x000007FEF6EE0000-0x000007FEF6EF1000-memory.dmp

    Filesize

    68KB

  • memory/584-31-0x000007FEF5DC0000-0x000007FEF6076000-memory.dmp

    Filesize

    2.7MB

  • memory/584-39-0x000007FEF5A80000-0x000007FEF5C8B000-memory.dmp

    Filesize

    2.0MB

  • memory/584-41-0x000007FEF6E90000-0x000007FEF6ED1000-memory.dmp

    Filesize

    260KB

  • memory/584-43-0x000007FEF6960000-0x000007FEF6978000-memory.dmp

    Filesize

    96KB

  • memory/584-42-0x000007FEF6E60000-0x000007FEF6E81000-memory.dmp

    Filesize

    132KB

  • memory/584-46-0x000007FEF5A40000-0x000007FEF5A51000-memory.dmp

    Filesize

    68KB

  • memory/584-45-0x000007FEF5A60000-0x000007FEF5A71000-memory.dmp

    Filesize

    68KB

  • memory/584-44-0x000007FEF6940000-0x000007FEF6951000-memory.dmp

    Filesize

    68KB

  • memory/584-47-0x000007FEF5A20000-0x000007FEF5A3B000-memory.dmp

    Filesize

    108KB

  • memory/584-48-0x000007FEF5A00000-0x000007FEF5A11000-memory.dmp

    Filesize

    68KB

  • memory/584-49-0x000007FEF59E0000-0x000007FEF59F8000-memory.dmp

    Filesize

    96KB

  • memory/584-50-0x000007FEF59B0000-0x000007FEF59E0000-memory.dmp

    Filesize

    192KB

  • memory/584-51-0x000007FEF5940000-0x000007FEF59A7000-memory.dmp

    Filesize

    412KB

  • memory/584-53-0x000007FEF58A0000-0x000007FEF58B1000-memory.dmp

    Filesize

    68KB

  • memory/584-54-0x000007FEF5840000-0x000007FEF5897000-memory.dmp

    Filesize

    348KB

  • memory/584-52-0x000007FEF58C0000-0x000007FEF593C000-memory.dmp

    Filesize

    496KB

  • memory/584-59-0x000007FEF5770000-0x000007FEF5781000-memory.dmp

    Filesize

    68KB

  • memory/584-60-0x000007FEF5750000-0x000007FEF5762000-memory.dmp

    Filesize

    72KB

  • memory/584-58-0x000007FEF5790000-0x000007FEF57B3000-memory.dmp

    Filesize

    140KB

  • memory/584-57-0x000007FEF57C0000-0x000007FEF57D8000-memory.dmp

    Filesize

    96KB

  • memory/584-56-0x000007FEF57E0000-0x000007FEF5804000-memory.dmp

    Filesize

    144KB

  • memory/584-55-0x000007FEF5810000-0x000007FEF5838000-memory.dmp

    Filesize

    160KB

  • memory/584-62-0x000007FEF1D80000-0x000007FEF1D97000-memory.dmp

    Filesize

    92KB

  • memory/584-61-0x000007FEEF730000-0x000007FEEF8B0000-memory.dmp

    Filesize

    1.5MB

  • memory/584-40-0x000007FEF4170000-0x000007FEF5220000-memory.dmp

    Filesize

    16.7MB