Analysis
-
max time kernel
445s -
max time network
446s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/03/2025, 21:14
Behavioral task
behavioral1
Sample
linux_arm6.elf
Resource
win11-20250313-en
General
-
Target
linux_arm6.elf
-
Size
5.1MB
-
MD5
f67aa24729b37795aa19446cdbee03a2
-
SHA1
71a70d18dd01cc86e1862f12ba72b35ee38db792
-
SHA256
7ad9220841260a3bdb6d1dd1654e2e45bacc53ca2715852a15351f242338b687
-
SHA512
c6cb3f269699647ce97667cb83e1bf7b369a7aa59d2421cefc5483dfef75002e6fe4a5f34c9643933ac2689eda7fef1f77b2b6cc3ab2829a7cbf03cd5c0051b2
-
SSDEEP
98304:8cSBHdgN2a7JP97kJru8cYWPAXqNu+60:8cS03Fu+6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\elf_auto_file\shell\Open\command\ = "\"C:\\Program Files\\VideoLAN\\VLC\\vlc.exe\" --started-from-file \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\elf_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\.elf\ = "elf_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\elf_auto_file\shell\Open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\elf_auto_file\shell\Open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\elf_auto_file\shell\Open\ = "Play with VLC media player" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\.elf OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\elf_auto_file\shell OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6108 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3332 OpenWith.exe 6108 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe 6108 vlc.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 3332 OpenWith.exe 6108 vlc.exe 5992 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3332 wrote to memory of 6108 3332 OpenWith.exe 80 PID 3332 wrote to memory of 6108 3332 OpenWith.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\linux_arm6.elf1⤵
- Modifies registry class
PID:2076
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\linux_arm6.elf"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6108
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD5857f55b929903232bd62706ccd8068dc
SHA1f5207e46b69313bbcdf65d63962e7f6ebf62f85f
SHA256c31e1bfa324f110087d6a81c345f64a084093db212419ecc39f24c896a07b0d6
SHA5123d8dec76512fd64d40c52088c3d6118a3fc75d69f9086e2ac940a75c43a16eee59074d7b28c91c3f035419c2aad9f1d7ffc622dbfcbcc74ebdecb131f60bec78
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD5ce190d557f2535130610161d141b1de6
SHA10078383a9e5d922d8fb38da128318201c764a710
SHA2564f3821e711ac1d369932933f7cccc8fd7e737d3c402b431491d3d92237992ef4
SHA512c621b269e8b99bcf3c77707e1efd71ec1b0194ad8ae6863dc64a604cddaf0c7f3efab1a75f94c7c1da9031dbe857aa9ddef7d47b6242789ed6639503630b1119
-
Filesize
87B
MD5eb4f8ff83fe114e1b83c3ef22d40ec59
SHA1160351d07b358eb33b00279a0a892a3f2d6ce5c3
SHA256e4ec14deefa7001c9f242c94bb3ab823668fd7c4844aedb24bb260e61147c87c
SHA512692a8746307ecde384178ad6ab748cf237e940f1cd0d3b94b0dde84e699376ecce7df6a0c7c3f3dcb66de2e57d4471ee98296b5486ecb36c031d58c9fc768956
-
Filesize
86B
MD5527ae9618ba64a3336de0521bb6c4566
SHA1249efc4f1fe9542f82e0f70a690340bdfaa956b1
SHA2566ba9140c01953be9b2b3d0c5b8b74cdaaaa6bda87fe41cec81ce801f8e924afc
SHA51208b143eb5be0c1a54bfe01cd21a7e0f029a18e84b6c7f86f0a5f447190a2c79986359fe903f188564807fcd4fe8d5104634d369b944e6a923057c95abb025a7a
-
Filesize
18B
MD5f20a4c8e743371ebca7b58cec58a6d63
SHA1327e4a5d29306c37d86aa2cb0414a4137d6d78d3
SHA256525c142e2803fa475fd52ee4e852edf7b55df2add5b4e826d4e1d22ca60c0981
SHA5129cd7d3116d448a3a8260503154e98ea2cf6d1428ccadea302e07dce75a2b0fc27d9836b6d96f794a6be7fa51ad7861d06f019b47e6495857c8bed4e78c7d8bde