Analysis
-
max time kernel
90s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
MobFarm 1_20.rar
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
MobFarm 1_20.rar
Resource
win10v2004-20240802-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
MobFarm 1_20.rar
-
Size
17.3MB
-
MD5
ddf8bf8b8e604863b71029c06adaad2f
-
SHA1
42ba47aa691a58e6202cc304b90afb6a65349a84
-
SHA256
e1f5ac0b8882f2d3221ca1fe79c82dc271acb29c0287227ec6f57a1a3384cb01
-
SHA512
00239b187b786c7b15e90d25964697f73fa2141767a1ed4f7f496332b472036fa24a71e732bf70e43eddd0443622ea4ed4fb1bbb4ecacc8015e7e312951fbc58
-
SSDEEP
393216:WIR30bpgSKK78b35nzzUKXNqRThsKqimtOGXX4vIeWdwP2NZggfne/bSV:wpH8b3dzV9qRThsKqL4vIM2NZvCbQ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4860 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4232 OpenWith.exe 4860 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe 4860 vlc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe 4232 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4860 4232 OpenWith.exe 94 PID 4232 wrote to memory of 4860 4232 OpenWith.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MobFarm 1_20.rar"1⤵
- Modifies registry class
PID:2844
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\MobFarm 1_20.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4860
-