Resubmissions
24-11-2024 17:01
241124-vj2q4swkdl 1026-10-2024 14:16
241026-rlatmawdjq 1026-10-2024 14:13
241026-rjt5gsvele 10Analysis
-
max time kernel
106s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 13:21
Behavioral task
behavioral1
Sample
Release/Discord rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Release/Discord rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
dnlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
dnlib.dll
Resource
win10v2004-20241007-en
General
-
Target
builder.exe
-
Size
10KB
-
MD5
4f04f0e1ff050abf6f1696be1e8bb039
-
SHA1
bebf3088fff4595bfb53aea6af11741946bbd9ce
-
SHA256
ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa
-
SHA512
94713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12
-
SSDEEP
96:IJXYAuB2glBLgyOk3LxdjP2rm549JSTuwUYXzP+B1izXTa/HFpff3LG+tzNt:IJXDk7LI4uwtDPC1ijCHffSs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4748 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4748 vlc.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe 4748 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4748 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\builder.exe"C:\Users\Admin\AppData\Local\Temp\builder.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1200
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\RenameGet.wav"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77B
MD5db96f037766352fe1d6daab0b0cef1f2
SHA183fa00aeeec2e3e3f72e5aef6db9821fb2b0b906
SHA25604e32279b320722337a2ba4414fef1dbde91f27f43e56adf7eb7a2731ed637cc
SHA5129cef394d99d75f8722d3f31efc3c597c763adf42d9e48083975be8948ec5673354ebae335166c0b5b038ce61f12278a39426ed4d43504ac576275480af43fd00