Overview
overview
10Static
static
10setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10$PLUGINSDI...gm.ogg
windows7-x64
1$PLUGINSDI...gm.ogg
windows10-2004-x64
7$PLUGINSDI...in.skf
windows7-x64
3$PLUGINSDI...in.skf
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...sh.bmp
windows7-x64
3$PLUGINSDI...sh.bmp
windows10-2004-x64
7Resource/1.bmp
windows7-x64
3Resource/1.bmp
windows10-2004-x64
7Resource/10.bmp
windows7-x64
3Resource/10.bmp
windows10-2004-x64
7Resource/11.bmp
windows7-x64
3Resource/11.bmp
windows10-2004-x64
7Resource/12.bmp
windows7-x64
3Resource/12.bmp
windows10-2004-x64
7Resource/13.bmp
windows7-x64
3Resource/13.bmp
windows10-2004-x64
7Resource/14.bmp
windows7-x64
3Resource/14.bmp
windows10-2004-x64
7Resource/15.bmp
windows7-x64
3Resource/15.bmp
windows10-2004-x64
7Resource/16.bmp
windows7-x64
3Resource/16.bmp
windows10-2004-x64
7Resource/2.bmp
windows7-x64
3Resource/2.bmp
windows10-2004-x64
7Resource/3.bmp
windows7-x64
3Resource/3.bmp
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 21:25
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/dat_bgm.ogg
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/dat_bgm.ogg
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/dat_skin.skf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/dat_skin.skf
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/splash.bmp
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/splash.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Resource/1.bmp
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Resource/1.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Resource/10.bmp
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Resource/10.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Resource/11.bmp
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Resource/11.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Resource/12.bmp
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Resource/12.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Resource/13.bmp
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Resource/13.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Resource/14.bmp
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Resource/14.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Resource/15.bmp
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Resource/15.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Resource/16.bmp
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Resource/16.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Resource/2.bmp
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Resource/2.bmp
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Resource/3.bmp
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Resource/3.bmp
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/dat_bgm.ogg
-
Size
165KB
-
MD5
f484a5db943fbefe894146a109513ff9
-
SHA1
3097181ce18c30933da3566d77b6beea5c9092ca
-
SHA256
ddae02d386f23c8d03792d06beb5100f1d230fa6c9c66b007fa5a3808e5dedaf
-
SHA512
634615101e5ccef3fbd6bb9fdac881808f231eccb79bd135dd804251b4d564cc89c7a14fe2fe548e7345a6437383edb8fb00ba19666834e4aeaced2103f3ff6d
-
SSDEEP
3072:tpbseuX0bbGvARsR9Eq9TBECn066ZCtALQOcCL3qFf4vklt/9Rs5BK2KAfnVGsGB:E7XXAc9NEmwmOb3qFztwBK2KAf2/KvT8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5084 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5084 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 388 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 388 AUDIODG.EXE Token: 33 5084 vlc.exe Token: SeIncBasePriorityPrivilege 5084 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe 5084 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5084 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2068 wrote to memory of 5084 2068 cmd.exe 83 PID 2068 wrote to memory of 5084 2068 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dat_bgm.ogg1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dat_bgm.ogg"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5084
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x30c 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:388