Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe
Resource
win10v2004-20240802-en
General
-
Target
ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe
-
Size
15.5MB
-
MD5
982e64a37fc9be43b18d68a786b9086e
-
SHA1
90b1cbfabeb6b29d6a66e0513e1165cacc613963
-
SHA256
ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84
-
SHA512
2b9c194c4d5cb15a548e87864ea22c9bd71fb570682138a472f8ddbf03d4a535bab434e1f1b6cf31cec693e961f8ba5fb49e2415280ad1baa2efe6222ec040cf
-
SSDEEP
393216:W3y6VVezFp72nM0cWLZ1qSZ+8Ns5xy3t1bdCC:W3vVVezv7qV/qG+8NZtnj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1040 n8YDV.exe -
Loads dropped DLL 2 IoCs
pid Process 1040 n8YDV.exe 1040 n8YDV.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n8YDV.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2944 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2944 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2944 vlc.exe Token: SeIncBasePriorityPrivilege 2944 vlc.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2944 vlc.exe 1040 n8YDV.exe 1040 n8YDV.exe 1040 n8YDV.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2988 2120 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 30 PID 2120 wrote to memory of 2988 2120 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 30 PID 2120 wrote to memory of 2988 2120 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 30 PID 2120 wrote to memory of 3004 2120 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 31 PID 2120 wrote to memory of 3004 2120 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 31 PID 2120 wrote to memory of 3004 2120 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 31 PID 3004 wrote to memory of 2944 3004 cmd.exe 33 PID 3004 wrote to memory of 2944 3004 cmd.exe 33 PID 3004 wrote to memory of 2944 3004 cmd.exe 33 PID 2988 wrote to memory of 1040 2988 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 35 PID 2988 wrote to memory of 1040 2988 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 35 PID 2988 wrote to memory of 1040 2988 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 35 PID 2988 wrote to memory of 1040 2988 ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe"C:\Users\Admin\AppData\Local\Temp\ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exeC:\Users\Admin\AppData\Local\Temp\ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe 45063C065A065606740669066106740667066B0642066706720667065A06650667066806620663065A067D064A06310669063206740632065C06300635064B064006340656064506650660067B065A0668063E065F0642065006--3652⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\ProgramData\cande\{L7o4r4Z63MF2PCcf}\n8YDV.exe"C:\ProgramData\cande\{L7o4r4Z63MF2PCcf}\n8YDV.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe.mp42⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe.mp4"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c56bd24aee2625eb6a06d97beae1ff2c
SHA1a007502595e41b8a830acb2b5d2bd632504d8831
SHA256ed998e0614e685addb67777d17a6dd82e296a4a05f16df63986abe8b786cda9f
SHA5125e786debe7764491cad106fd499b79aef9d901fcd725851bc5476b115c1e9edf66d23b66f8d29c93207d9d1835da465c10f8b677d178df8f72a3597b47881ecc
-
Filesize
289B
MD5e5fd650120f8ab745f66cf2cddaf9425
SHA1695428ea38d4392f96c25970d8308fd9339daba2
SHA256e5c19f5608f1128f6f30726cfd63d6ce552ed5cc4f1ce984d3bb2dfb730fca47
SHA512971b990d0faa06eafd4de15f483b2149acb858e17eea7132f2f1bdc69f6fb9228cf1f610a99dd89ecd84cd5e8f291eaa03100a6bc1471c2148d373912c8960e1
-
C:\Users\Admin\AppData\Local\Temp\ad82d4b79bca93c8124446384ec5847b21e0f9c436cefe384fb69ea7e7d44e84.exe.mp4
Filesize9.5MB
MD537cda6a12848d7ed55bc4896243f2466
SHA1adc2ec17923910868fff0b434bb86fb288d4453a
SHA256fcc59f78c2cf04eac0da70407c07ffdeb1e7f3e32e4f3fbd44c32de69aa91b1e
SHA512b4d1bcab19723d08335d873de45be39845918ca0cfa22b0681d7c9005a6ed3328ea9c3b1ebb24a636b848397bff4cf2ea735f2b15eb68bc42f8d37e9d61ccba0
-
Filesize
3.7MB
MD5b9e9eda764b738d0d6fc6c37e9ced004
SHA15badbb5e7ed5aa4e104679189dc8744ab626ba53
SHA25664913db0a193aa7388f32d0ec189a8015b84909d8052a643fcc3ef1a904b152b
SHA512cb2234d6050459228c1540a959b2323c5be64e56eca31deb84d055a140ea937cdf43896a8248e8c5e1116e42b67155e7347d3bb08ebd1bf0ce69f802520b9351