Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 11:53
Behavioral task
behavioral1
Sample
fall.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fall.exe
Resource
win10v2004-20241007-en
General
-
Target
fall.exe
-
Size
903KB
-
MD5
b86a2a0af835000d484d496fec1d5ffc
-
SHA1
dfe20835aba1f39c124d540e925c67cc02910200
-
SHA256
9e1c62eb882475a97643802f9b4ee456837abff20b9c23b7805504b6fa99b5e6
-
SHA512
bc79a3c5ef97951c1c7a16ba875a253cbef6750ccc3ba03fe46bdf2a066ed9d95917e77834c636d440a655403de7861dd66082f0fdb1317c70141e45b59609d3
-
SSDEEP
12288:K8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawflBa2Ley+trZNrI0AilFEvxHvBg:r3s4MROxnFCay6rZlI0AilFEvxHiGU
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3008 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3008 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2168 2396 fall.exe 29 PID 2396 wrote to memory of 2168 2396 fall.exe 29 PID 2396 wrote to memory of 2168 2396 fall.exe 29 PID 2168 wrote to memory of 2948 2168 csc.exe 31 PID 2168 wrote to memory of 2948 2168 csc.exe 31 PID 2168 wrote to memory of 2948 2168 csc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fall.exe"C:\Users\Admin\AppData\Local\Temp\fall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u_tcprpg.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7743.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7742.tmp"3⤵PID:2948
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\MergeProtect.mpv2"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3008
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD55a8581b4799410c70c44654f2e81d936
SHA1edf5771f850722f4489bab032e8a710ad8174d28
SHA256bc6c418115edcfb442a491e75c6267056c4a0bd45034430689b0a62ca834707c
SHA51220b43eea327aa0ff69985bfef0bbbc038019a7d31868e2fbf97e8acc440c2bda93df93f0f98a79222de6f2e9ff1c8072b8b2dd7b7d923bcf82e12425055c6423
-
Filesize
76KB
MD54f1883ee245d7e10a7b9aeb3d9a52d29
SHA14d0a57faf621a9c0e4db3889c6fb88e4ebaa37a2
SHA2561a3da9e2f7f8f721b45d4998008ec5d0567604c1de6dce6198659f75e825b55e
SHA512915487d861fa8ff207f576e81ee014ff9331b49f1f44be549406b4b45c9bb98b8acf0b72fd23baab9aaee19f909e33fbc913da1fd01a904623ceb4ec64d11f6d
-
Filesize
676B
MD535bce98dc2cb0665b85dbad4ec3c0a52
SHA19fa326f456493d6844535831923960fae3810112
SHA2560ba6d1ff8aa0b958d801daf0231ac324ae8806d5618c1bba00590e480bab10c2
SHA5121feb917d7654d7cb6c084f9834f9f9ae3c143e7501f12b374a0b336636fc1545660eacdebbfa5fd9e8cffe6d7a4c4b1049ee8355e205f772db6810e6b8f50f5e
-
Filesize
208KB
MD56011503497b1b9250a05debf9690e52c
SHA1897aea61e9bffc82d7031f1b3da12fb83efc6d82
SHA25608f42b8d57bb61bc8f9628c8a80953b06ca4149d50108083fca6dc26bdd49434
SHA512604c33e82e8b5bb5c54389c2899c81e5482a06e69db08268173a5b4574327ee5de656d312011d07e50a2e398a4c9b0cd79029013f76e05e18cf67ce5a916ffd9
-
Filesize
349B
MD54fff779ba0c11bfe8465736aa8253fc4
SHA1b8364383eccbc39894d26da136b4c44be14e2a3b
SHA256ea28be9514c4e5ddeca811e2378672c50b5096f6c89d499f989706f3f498ae58
SHA5125756d99d698a55d1635eb314ebcc66e1d28241dbabff0f49c56c7f4563f62f934db5666c1c91c0cbad043445108a2377f40cf2bac1ed5c41290f4974a1f4ef10