Resubmissions

10-01-2025 01:07

250110-bgrzcawphv 10

09-01-2025 22:10

250109-13nw9aspdw 10

Analysis

  • max time kernel
    263s
  • max time network
    274s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 01:07

General

  • Target

    IDA-Pro-7.7-main/ida64.exe

  • Size

    4.0MB

  • MD5

    24ba0b4e0a3445a6c2fb866d94669f05

  • SHA1

    3b6bf89f5ec4b19266260fd488ae720a90f1865d

  • SHA256

    70840575ebddb25412f6de60329d5d395b325b709df9202411b723d0744c9624

  • SHA512

    dcbd7babaa0de562a0a6682c3c0b053c419ddc2e78d6a0213c081a5ca50a256a720d0c6cbf3b2de669a5410918dfeb2d7d4fc29b23ae3285103c8e3c2be8b2b0

  • SSDEEP

    49152:GQptxtn8v9flRURQXyczsoBR9RAzkdk9ltnv2UtxOpYjObpJWYcmD75zoELxnXAm:GitxMR4QuoBPRAzz9lRvMVtdwdZro6m

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IDA-Pro-7.7-main\ida64.exe
    "C:\Users\Admin\AppData\Local\Temp\IDA-Pro-7.7-main\ida64.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4564
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4a4 0x308
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\VideoLAN\VLC\vlc.exe.id2

    Filesize

    84B

    MD5

    c9498747bb8152ed134b01583f068b66

    SHA1

    de9dc1df9a1620245f75d15e1818883222ceaaa7

    SHA256

    edbfe178ed23e5977e1c07f7310e7612d247757ea6d47da8419332d2d4636a7f

    SHA512

    70e18d308e5fb38c31c043e6acab9a89126e30f96464ab970397ea53b06be92b99df00198168fa229b20c16e1393f79d195b5d458438fdf4fd24f8cc48fee824

  • C:\Program Files\VideoLAN\VLC\vlc.exe.id2

    Filesize

    9KB

    MD5

    b99c31fb4038474078a34be5f3260438

    SHA1

    d3752fc61655ac3f79bf5f83045730ec7ce5ee00

    SHA256

    65fa25ab8fda5150cf6d01da8b15342f961151978d5e1d7c35f8d0f03c985866

    SHA512

    3526bf44d1ab071460c4a8a6a34d6dc03735e608e6430f409764ef7f783a8cbe8660584fb4bf225964a92a3c15ad730597939bdee24a87d9c7123af29d77b502

  • memory/4564-5-0x000001ADFCF80000-0x000001ADFCFB6000-memory.dmp

    Filesize

    216KB

  • memory/4564-33-0x000001AD805D0000-0x000001AD80606000-memory.dmp

    Filesize

    216KB

  • memory/4564-0-0x00007FFF762C0000-0x00007FFF76816000-memory.dmp

    Filesize

    5.3MB

  • memory/4564-4-0x000001ADFCF80000-0x000001ADFCFAE000-memory.dmp

    Filesize

    184KB

  • memory/4564-7-0x00007FFF848B0000-0x00007FFF848D7000-memory.dmp

    Filesize

    156KB

  • memory/4564-14-0x000001AD80180000-0x000001AD801AE000-memory.dmp

    Filesize

    184KB

  • memory/4564-2-0x000001ADF7CC0000-0x000001ADF7CD0000-memory.dmp

    Filesize

    64KB

  • memory/4564-6-0x00007FFF848B0000-0x00007FFF848D7000-memory.dmp

    Filesize

    156KB

  • memory/4564-37-0x00007FFF89770000-0x00007FFF89797000-memory.dmp

    Filesize

    156KB

  • memory/4564-38-0x00007FFF89770000-0x00007FFF89797000-memory.dmp

    Filesize

    156KB

  • memory/4564-47-0x00007FFF89770000-0x00007FFF89797000-memory.dmp

    Filesize

    156KB

  • memory/4564-52-0x00007FFF89770000-0x00007FFF89797000-memory.dmp

    Filesize

    156KB

  • memory/4564-1-0x00007FF7C6920000-0x00007FF7C6D1F000-memory.dmp

    Filesize

    4.0MB

  • memory/4564-78-0x000001ADF7CC0000-0x000001ADF7CD0000-memory.dmp

    Filesize

    64KB