Analysis
-
max time kernel
576s -
max time network
437s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 21:05
Behavioral task
behavioral1
Sample
rundll3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rundll3.exe
Resource
win10v2004-20240802-en
General
-
Target
rundll3.exe
-
Size
5.6MB
-
MD5
be8e765b8622989c5e4aa6414c2b030c
-
SHA1
b6cb7f1ffcceff8fbe572594ffc6aa515420e0a0
-
SHA256
6fdb160c3b7a5813f187afd606ef2e24cfde0e66e3a0663ce65cd1372fdc32ab
-
SHA512
e0522301c8d2c156fe6157d7d1ca3a305078ed35bd3a2cf1131bea2a97246eaa8e00751cb4ad9c63e26d97149bdf5898da6d443d8c224735c81589462bd571ad
-
SSDEEP
49152:YfPM6fbpCpuj2TCOHIiRO06E6M5UqdJtunHnVnzm5EatXXzihWGNggHL/rF2tZVb:GpRY2IEfm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4372 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2496 vlc.exe 5096 WINWORD.EXE 5096 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3876 rundll3.exe 1092 powershell.exe 1092 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2496 vlc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1092 powershell.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe 2496 vlc.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2496 vlc.exe 5096 WINWORD.EXE 5096 WINWORD.EXE 5096 WINWORD.EXE 5096 WINWORD.EXE 5096 WINWORD.EXE 5096 WINWORD.EXE 5096 WINWORD.EXE 5096 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\rundll3.exe"C:\Users\Admin\AppData\Local\Temp\rundll3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\AssertResume.mov"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2496
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\DenySwitch.ini1⤵
- Opens file in notepad (likely ransom note)
PID:4372
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\EditShow.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
313B
MD51122379611c5deb49136f7e22f4c53a8
SHA151ace13eedc524f10f63d6fcfc6553b9e01cbfc3
SHA256c4941691a440327f209e6674d6e270d67fd6235840a353ca53e326e67d666795
SHA512395eef6cac34f875df91519bb288220c77206fd296426f21227c90abe856acd5c3defe8b1ea9f4461c63e233b422884c2bd0dbb0313c7476a2da34ed8f79d6aa
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5c7d020a7bcf156f884b5d2cdefdf0414
SHA195b6b5906ddc68a6efaa5a6422a985c95c9ea66c
SHA25619c31552a444d445ae4b424c076156b7b09631a963d50a13a0b6b85e29f47f7e
SHA5129e475d8954576fb5b15ee88a54891efd195112113667696f2b4d2a781f1bde722cf2adccddd4f71474e443260b298ab02996f79b5bfe9e2e2157f96eb5fac39a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5604b190737bbc649efd74c4873359390
SHA1f35d2970a08596db845a9a78d0021b9d3994b07f
SHA256bb6c731b907ce96f3858dd5bcd4acb54f3fb067a6fe88b88253acdeacaea5010
SHA512871cc20f03a1aa81034647e59ea8a90a069f250f2d8da0b7c8800ce9c236ad6ef9a29911c7ad5c2b51484e760f8f715c6c9ae2dc8a54201736d81cd0395521eb
-
Filesize
77B
MD5cb405ea3112a04e1fbd91adad97d7bd8
SHA1fd5cddb6d224eec39b37b563a32ab91c3e2e284e
SHA2562a6573dc283155b0029d75c5fd8349074482a9adb8384bcc3aefc59da1447aa9
SHA512ccbb1f8231d55f88276ef880289b30ade3b80c31bd103070f7ac7e34470541fafea180ec7df953dfd16e99bb79db661a53739be7efdbf501adb2c7f1af1e342c