Analysis

  • max time kernel
    153s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:29

General

  • Target

    Wave.JohnPrlx.cracked.rar

  • Size

    10.3MB

  • MD5

    a502e43649c31bd6007912d68b37cad1

  • SHA1

    9076425d466c78f4cf458ab9913fb0880fecf7d0

  • SHA256

    6d5ff2230c713e9372d23989c3ea247d814ffc6f19380be86f7bccf3c0b6ff91

  • SHA512

    cebdaf98e4406fcb95c3086c976c16313230c2630c610d542c61e1c8a655c28a4a6555d9c40a8faed760827d24613acc624547390d66e59f1a77ef7e45ff7ca0

  • SSDEEP

    196608:3xLL5xzen4Pdl4KmMJpgkGTSLv+gaiPBgy/fxKKXWK22Ddd:hPKn4PYhT4ai/xPGQdd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Wave.JohnPrlx.cracked.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Wave.JohnPrlx.cracked.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:344
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Wave.JohnPrlx.cracked.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Wave.JohnPrlx.cracked.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2444

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2444-30-0x000007FEFAAC0000-0x000007FEFAAF4000-memory.dmp
    Filesize

    208KB

  • memory/2444-29-0x000000013F890000-0x000000013F988000-memory.dmp
    Filesize

    992KB

  • memory/2444-34-0x000007FEFAA60000-0x000007FEFAA71000-memory.dmp
    Filesize

    68KB

  • memory/2444-33-0x000007FEFAA80000-0x000007FEFAA97000-memory.dmp
    Filesize

    92KB

  • memory/2444-32-0x000007FEFAAA0000-0x000007FEFAAB8000-memory.dmp
    Filesize

    96KB

  • memory/2444-35-0x000007FEFAA40000-0x000007FEFAA57000-memory.dmp
    Filesize

    92KB

  • memory/2444-36-0x000007FEFA310000-0x000007FEFA321000-memory.dmp
    Filesize

    68KB

  • memory/2444-38-0x000007FEF7410000-0x000007FEF7421000-memory.dmp
    Filesize

    68KB

  • memory/2444-37-0x000007FEFA2F0000-0x000007FEFA30D000-memory.dmp
    Filesize

    116KB

  • memory/2444-31-0x000007FEF5990000-0x000007FEF5C46000-memory.dmp
    Filesize

    2.7MB

  • memory/2444-42-0x000007FEF7140000-0x000007FEF7161000-memory.dmp
    Filesize

    132KB

  • memory/2444-44-0x000007FEF6C10000-0x000007FEF6C21000-memory.dmp
    Filesize

    68KB

  • memory/2444-45-0x000007FEF6BF0000-0x000007FEF6C01000-memory.dmp
    Filesize

    68KB

  • memory/2444-49-0x000007FEF6B70000-0x000007FEF6B88000-memory.dmp
    Filesize

    96KB

  • memory/2444-52-0x000007FEF5370000-0x000007FEF53EC000-memory.dmp
    Filesize

    496KB

  • memory/2444-55-0x000007FEF6130000-0x000007FEF6158000-memory.dmp
    Filesize

    160KB

  • memory/2444-56-0x000007FEF52E0000-0x000007FEF5304000-memory.dmp
    Filesize

    144KB

  • memory/2444-57-0x000007FEF6110000-0x000007FEF6128000-memory.dmp
    Filesize

    96KB

  • memory/2444-59-0x000007FEF5290000-0x000007FEF52A1000-memory.dmp
    Filesize

    68KB

  • memory/2444-60-0x000007FEF5270000-0x000007FEF5282000-memory.dmp
    Filesize

    72KB

  • memory/2444-58-0x000007FEF52B0000-0x000007FEF52D3000-memory.dmp
    Filesize

    140KB

  • memory/2444-54-0x000007FEF5310000-0x000007FEF5367000-memory.dmp
    Filesize

    348KB

  • memory/2444-53-0x000007FEF6160000-0x000007FEF6171000-memory.dmp
    Filesize

    68KB

  • memory/2444-51-0x000007FEF65F0000-0x000007FEF6657000-memory.dmp
    Filesize

    412KB

  • memory/2444-50-0x000007FEF6660000-0x000007FEF6690000-memory.dmp
    Filesize

    192KB

  • memory/2444-48-0x000007FEF6B90000-0x000007FEF6BA1000-memory.dmp
    Filesize

    68KB

  • memory/2444-47-0x000007FEF6BB0000-0x000007FEF6BCB000-memory.dmp
    Filesize

    108KB

  • memory/2444-46-0x000007FEF6BD0000-0x000007FEF6BE1000-memory.dmp
    Filesize

    68KB

  • memory/2444-43-0x000007FEF7230000-0x000007FEF7248000-memory.dmp
    Filesize

    96KB

  • memory/2444-41-0x000007FEF7170000-0x000007FEF71B1000-memory.dmp
    Filesize

    260KB

  • memory/2444-40-0x000007FEF53F0000-0x000007FEF55FB000-memory.dmp
    Filesize

    2.0MB

  • memory/2444-39-0x000007FEF3D20000-0x000007FEF4DD0000-memory.dmp
    Filesize

    16.7MB