Resubmissions

24-11-2024 17:01

241124-vj2q4swkdl 10

26-10-2024 14:16

241026-rlatmawdjq 10

26-10-2024 14:13

241026-rjt5gsvele 10

Analysis

  • max time kernel
    106s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2024 13:21

General

  • Target

    builder.exe

  • Size

    10KB

  • MD5

    4f04f0e1ff050abf6f1696be1e8bb039

  • SHA1

    bebf3088fff4595bfb53aea6af11741946bbd9ce

  • SHA256

    ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa

  • SHA512

    94713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12

  • SSDEEP

    96:IJXYAuB2glBLgyOk3LxdjP2rm549JSTuwUYXzP+B1izXTa/HFpff3LG+tzNt:IJXDk7LI4uwtDPC1ijCHffSs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\builder.exe
    "C:\Users\Admin\AppData\Local\Temp\builder.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4448
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1200
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\RenameGet.wav"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

      Filesize

      77B

      MD5

      db96f037766352fe1d6daab0b0cef1f2

      SHA1

      83fa00aeeec2e3e3f72e5aef6db9821fb2b0b906

      SHA256

      04e32279b320722337a2ba4414fef1dbde91f27f43e56adf7eb7a2731ed637cc

      SHA512

      9cef394d99d75f8722d3f31efc3c597c763adf42d9e48083975be8948ec5673354ebae335166c0b5b038ce61f12278a39426ed4d43504ac576275480af43fd00

    • memory/4448-3-0x0000000005840000-0x00000000058D2000-memory.dmp

      Filesize

      584KB

    • memory/4448-8-0x0000000008BE0000-0x0000000008D02000-memory.dmp

      Filesize

      1.1MB

    • memory/4448-0-0x00000000751EE000-0x00000000751EF000-memory.dmp

      Filesize

      4KB

    • memory/4448-4-0x0000000005900000-0x000000000590A000-memory.dmp

      Filesize

      40KB

    • memory/4448-5-0x00000000751E0000-0x0000000075990000-memory.dmp

      Filesize

      7.7MB

    • memory/4448-6-0x00000000751EE000-0x00000000751EF000-memory.dmp

      Filesize

      4KB

    • memory/4448-7-0x00000000751E0000-0x0000000075990000-memory.dmp

      Filesize

      7.7MB

    • memory/4448-2-0x0000000005D10000-0x00000000062B4000-memory.dmp

      Filesize

      5.6MB

    • memory/4448-1-0x0000000000E40000-0x0000000000E48000-memory.dmp

      Filesize

      32KB

    • memory/4448-45-0x00000000751E0000-0x0000000075990000-memory.dmp

      Filesize

      7.7MB

    • memory/4748-40-0x00007FF7388F0000-0x00007FF7389E8000-memory.dmp

      Filesize

      992KB

    • memory/4748-42-0x00007FFF2B100000-0x00007FFF2B3B6000-memory.dmp

      Filesize

      2.7MB

    • memory/4748-43-0x00007FFF28180000-0x00007FFF29230000-memory.dmp

      Filesize

      16.7MB

    • memory/4748-41-0x00007FFF3B310000-0x00007FFF3B344000-memory.dmp

      Filesize

      208KB