Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
Yamaha Vocaloid 6.4.2 Full Package.rar
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Yamaha Vocaloid 6.4.2 Full Package.rar
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Yamaha Vocaloid 6.4.2 Full Package.rar
-
Size
867.8MB
-
MD5
7e1db8f58e1aa45b26fb4457be5bb926
-
SHA1
5df6034ea5a6ea8d94ef74cd602bfe609bb622da
-
SHA256
389e69968bd3dcfbc4efb012df0713e31ae55c04239a3022bddcee66935e4fbd
-
SHA512
5ec500357e876aacfce5a7217b4219136f4ed44b63a994a58e9b40a7d51e27120acdb189fca8ecb0f1267c9d9ea8ef713926a1f3f80f77f27fb644c3a5187c38
-
SSDEEP
25165824:vMo2UmPaYRN9LRI92r5v1NXIabzZ6XyOYwTKMxXxxJ:vMoqaYRP7h1dIaHZ6OIKYxv
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1212 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2784 rundll32.exe 1212 vlc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe 1212 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1212 vlc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2084 wrote to memory of 600 2084 cmd.exe 32 PID 2084 wrote to memory of 600 2084 cmd.exe 32 PID 2084 wrote to memory of 600 2084 cmd.exe 32 PID 600 wrote to memory of 2784 600 rundll32.exe 33 PID 600 wrote to memory of 2784 600 rundll32.exe 33 PID 600 wrote to memory of 2784 600 rundll32.exe 33 PID 2784 wrote to memory of 2880 2784 rundll32.exe 34 PID 2784 wrote to memory of 2880 2784 rundll32.exe 34 PID 2784 wrote to memory of 2880 2784 rundll32.exe 34 PID 2880 wrote to memory of 1212 2880 rundll32.exe 36 PID 2880 wrote to memory of 1212 2880 rundll32.exe 36 PID 2880 wrote to memory of 1212 2880 rundll32.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Yamaha Vocaloid 6.4.2 Full Package.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Yamaha Vocaloid 6.4.2 Full Package.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Yamaha Vocaloid 6.4.2 Full Package.rar3⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Yamaha Vocaloid 6.4.2 Full Package.rar4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Yamaha Vocaloid 6.4.2 Full Package.rar"5⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2824