Analysis

  • max time kernel
    189s
  • max time network
    210s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    27/01/2025, 23:34

General

  • Target

    #P@S$wǾr𝓓__8166--Se-tUp@!.7z

  • Size

    643KB

  • MD5

    614f3a069620550c52857d50d04ed61c

  • SHA1

    879e74a84116e8afa07eadd382a2fa9d0cb9d49f

  • SHA256

    2e590d06a6bfe546455c2683afaf8d732dafa35c19dca2e51ca16024dbbe4b53

  • SHA512

    5bed64a68af81c41e9661d222f2b7212c8c25e4f96bf1f47d1a859993b3f68947b3c1b0f919a6df6c011bf28107dbe336c3ed593c0c0659aed7fdd159bf8abc8

  • SSDEEP

    12288:U6lXoAow3jU6PA0CRAZOzIl67TC3/A4j18y0wDhjx9kuagdPLmVEc9PFityFdR:Bf33AyaI07+vjOy0w0gxGEcnitAR

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\#P@S$wǾr𝓓__8166--Se-tUp@!.7z"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4452
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3240
    • C:\Windows\System32\oobe\UserOOBEBroker.exe
      C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      PID:2728
    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
      C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
      1⤵
      • System Location Discovery: System Language Discovery
      PID:3892
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\HideExit.aiff"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4696-21-0x00007FFB70B00000-0x00007FFB70B34000-memory.dmp

      Filesize

      208KB

    • memory/4696-20-0x00007FF6B29B0000-0x00007FF6B2AA8000-memory.dmp

      Filesize

      992KB

    • memory/4696-22-0x00007FFB58A90000-0x00007FFB58D46000-memory.dmp

      Filesize

      2.7MB

    • memory/4696-23-0x00007FFB55D00000-0x00007FFB56DB0000-memory.dmp

      Filesize

      16.7MB