Analysis
-
max time kernel
189s -
max time network
210s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
27/01/2025, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
#Pa$$CŌ𝔻e--8166__OpeN-Se-tUp@!#.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
#P@S$wǾr𝓓__8166--Se-tUp@!.7z
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
!Premium--SatUp/setup.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
Pa$S_-_8166.txt
Resource
win10ltsc2021-20250113-en
General
-
Target
#P@S$wǾr𝓓__8166--Se-tUp@!.7z
-
Size
643KB
-
MD5
614f3a069620550c52857d50d04ed61c
-
SHA1
879e74a84116e8afa07eadd382a2fa9d0cb9d49f
-
SHA256
2e590d06a6bfe546455c2683afaf8d732dafa35c19dca2e51ca16024dbbe4b53
-
SHA512
5bed64a68af81c41e9661d222f2b7212c8c25e4f96bf1f47d1a859993b3f68947b3c1b0f919a6df6c011bf28107dbe336c3ed593c0c0659aed7fdd159bf8abc8
-
SSDEEP
12288:U6lXoAow3jU6PA0CRAZOzIl67TC3/A4j18y0wDhjx9kuagdPLmVEc9PFityFdR:Bf33AyaI07+vjOy0w0gxGEcnitAR
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4696 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4696 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4452 7zFM.exe Token: 35 4452 7zFM.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 4452 7zFM.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe 4696 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4696 vlc.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\#P@S$wǾr𝓓__8166--Se-tUp@!.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4452
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3240
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2728
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:3892
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\HideExit.aiff"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4696