Analysis

  • max time kernel
    20s
  • max time network
    17s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    21-11-2024 13:02

General

  • Target

    2024-11-21 13-58-06.mkv

  • Size

    4.6MB

  • MD5

    8de5da71ea886b6e2df69121b05409b2

  • SHA1

    4894b3ea0d695522a5a601c52e968dbc6c82a8a8

  • SHA256

    4821c6377eeff4148384361ad92e90d08e6ebbb72499f67f32836d6c620ca59c

  • SHA512

    d9bc5ae17611db5403389f22abab0fdabbca0911c565d463f82d9b4af7c695c193bf0d10e0c1ba2dd5714972dce09656eac8c47e7244cede77a2501681b98206

  • SSDEEP

    49152:v5vC4uW4hnrsDXZicqI76+M1PmqsdnvKrl/At:RvruWCnrYi1Prsdd

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\2024-11-21 13-58-06.mkv"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3012
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4e0 0x504
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3012-7-0x00007FF61C570000-0x00007FF61C668000-memory.dmp

    Filesize

    992KB

  • memory/3012-8-0x00007FF8F4AB0000-0x00007FF8F4AE4000-memory.dmp

    Filesize

    208KB

  • memory/3012-16-0x00007FF8F4B90000-0x00007FF8F4BA1000-memory.dmp

    Filesize

    68KB

  • memory/3012-17-0x00007FF8E5AC0000-0x00007FF8E5CCB000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-18-0x00007FF8F4920000-0x00007FF8F4961000-memory.dmp

    Filesize

    260KB

  • memory/3012-15-0x00007FF8F4E90000-0x00007FF8F4EAD000-memory.dmp

    Filesize

    116KB

  • memory/3012-14-0x00007FF8F5790000-0x00007FF8F57A1000-memory.dmp

    Filesize

    68KB

  • memory/3012-9-0x00007FF8F4230000-0x00007FF8F44E6000-memory.dmp

    Filesize

    2.7MB

  • memory/3012-13-0x00007FF8F76F0000-0x00007FF8F7707000-memory.dmp

    Filesize

    92KB

  • memory/3012-12-0x00007FF8F97E0000-0x00007FF8F97F1000-memory.dmp

    Filesize

    68KB

  • memory/3012-11-0x00007FF8FBF00000-0x00007FF8FBF17000-memory.dmp

    Filesize

    92KB

  • memory/3012-10-0x00007FF8FBFD0000-0x00007FF8FBFE8000-memory.dmp

    Filesize

    96KB

  • memory/3012-24-0x00007FF8F48A0000-0x00007FF8F48B1000-memory.dmp

    Filesize

    68KB

  • memory/3012-23-0x00007FF8F48C0000-0x00007FF8F48D1000-memory.dmp

    Filesize

    68KB

  • memory/3012-22-0x00007FF8F48E0000-0x00007FF8F48F1000-memory.dmp

    Filesize

    68KB

  • memory/3012-21-0x00007FF8F4900000-0x00007FF8F4918000-memory.dmp

    Filesize

    96KB

  • memory/3012-20-0x00007FF8F4A80000-0x00007FF8F4AA1000-memory.dmp

    Filesize

    132KB

  • memory/3012-19-0x00007FF8E4A10000-0x00007FF8E5AC0000-memory.dmp

    Filesize

    16.7MB

  • memory/3012-27-0x00007FF8F4230000-0x00007FF8F44E6000-memory.dmp

    Filesize

    2.7MB

  • memory/3012-37-0x00007FF8E4A10000-0x00007FF8E5AC0000-memory.dmp

    Filesize

    16.7MB