Analysis

  • max time kernel
    61s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-10-2024 23:42

General

  • Target

    The-MALWARE-Repo-master.zip

  • Size

    198.8MB

  • MD5

    af60ad5b6cafd14d7ebce530813e68a0

  • SHA1

    ad81b87e7e9bbc21eb93aca7638d827498e78076

  • SHA256

    b7dd3bce3ebfbc2d5e3a9f00d47f27cb6a5895c4618c878e314e573a7c216df1

  • SHA512

    81314363d5d461264ed5fdf8a7976f97bceb5081c374b4ee6bbea5d8ce3386822d089d031234ddd67c5077a1cc1ed3f6b16139253fbb1b3d34d3985f9b97aba3

  • SSDEEP

    6291456:wNl3aFW2h9/fiTwCzCLS6iilVkLZgAEtknRzq:wDaFd//Orcpi4VkL6AfRG

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3872
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:872
    • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\Avoid.exe
      "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\Avoid.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:1960
    • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\ChilledWindows.exe
      "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\ChilledWindows.exe"
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3128
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004F0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

      Filesize

      384KB

      MD5

      d35defde3ad3faecd5955399986c9785

      SHA1

      7762067bc38abb0654f552bd5967404c57954ea3

      SHA256

      69d351f5546d8e20aed4549148ce8b8344faa65fb64e00b248028ac408922319

      SHA512

      cabff3a74b4b18b87b389f74c383dd79f33f17504a239deb35bb0ccf0d6f9e20b638d136ef8b3b7390f48a16e4f9398f264cc714766c8f7c032124a8737d84d0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

      Filesize

      9KB

      MD5

      7050d5ae8acfbe560fa11073fef8185d

      SHA1

      5bc38e77ff06785fe0aec5a345c4ccd15752560e

      SHA256

      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

      SHA512

      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

    • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\Avoid.exe

      Filesize

      248KB

      MD5

      20d2c71d6d9daf4499ffc4a5d164f1c3

      SHA1

      38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8

      SHA256

      3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d

      SHA512

      8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

    • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\ChilledWindows.exe

      Filesize

      4.4MB

      MD5

      6a4853cd0584dc90067e15afb43c4962

      SHA1

      ae59bbb123e98dc8379d08887f83d7e52b1b47fc

      SHA256

      ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec

      SHA512

      feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

    • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\chilledwindows.mp4

      Filesize

      3.6MB

      MD5

      698ddcaec1edcf1245807627884edf9c

      SHA1

      c7fcbeaa2aadffaf807c096c51fb14c47003ac20

      SHA256

      cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b

      SHA512

      a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155

    • memory/1960-484-0x0000000002210000-0x0000000002211000-memory.dmp

      Filesize

      4KB

    • memory/1960-519-0x0000000002210000-0x0000000002211000-memory.dmp

      Filesize

      4KB

    • memory/1960-518-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/3128-487-0x00007FFD8D913000-0x00007FFD8D915000-memory.dmp

      Filesize

      8KB

    • memory/3128-502-0x000000001C940000-0x000000001C94E000-memory.dmp

      Filesize

      56KB

    • memory/3128-501-0x000000001C970000-0x000000001C9A8000-memory.dmp

      Filesize

      224KB

    • memory/3128-500-0x000000001C8E0000-0x000000001C8E8000-memory.dmp

      Filesize

      32KB

    • memory/3128-488-0x0000000000E70000-0x00000000012D4000-memory.dmp

      Filesize

      4.4MB

    • memory/3128-523-0x00007FFD8D913000-0x00007FFD8D915000-memory.dmp

      Filesize

      8KB

    • memory/3128-522-0x000000001C530000-0x000000001C6E3000-memory.dmp

      Filesize

      1.7MB