Analysis

  • max time kernel
    34s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 16:28

General

  • Target

    RayzMod V3/Extreme.Net.dll

  • Size

    163KB

  • MD5

    b501745a68ce3aeb82135264d3eab64e

  • SHA1

    019aa9833669ea1135cf20c075d82e45806f1c3e

  • SHA256

    b6ec30050b06fe9a133d6a3d3c8a2c69046fb9037a16c761a1cff8cc65d5c0b1

  • SHA512

    d5e7f597622a67806a673fd16a91125ab21155648c65d00c4e4f2d0cddaa62015fa27adacd1b04990814abb7a2732a8bf4c8aa9971ccda498972327d2fad6576

  • SSDEEP

    3072:Tveb5wQUp+tZWiO2Gg7EZ8StYmijRAaCeu9CMR:CuQUp+tZWiO2G4VStpijm

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\RayzMod V3\Extreme.Net.dll",#1
    1⤵
      PID:2824
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2812
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\ClearGrant.asx"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:536

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/536-13-0x000007FEF7720000-0x000007FEF7754000-memory.dmp

        Filesize

        208KB

      • memory/536-12-0x000000013F580000-0x000000013F678000-memory.dmp

        Filesize

        992KB

      • memory/536-14-0x000007FEF6800000-0x000007FEF6AB6000-memory.dmp

        Filesize

        2.7MB

      • memory/536-16-0x000007FEF42E0000-0x000007FEF43EE000-memory.dmp

        Filesize

        1.1MB

      • memory/536-15-0x000007FEF5620000-0x000007FEF66D0000-memory.dmp

        Filesize

        16.7MB