Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:15
Behavioral task
behavioral1
Sample
ViRuS/1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ViRuS/1.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ViRuS/10.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ViRuS/10.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
ViRuS/11.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ViRuS/11.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ViRuS/12.exe
Resource
win7-20231215-en
General
-
Target
ViRuS/10.exe
-
Size
34KB
-
MD5
764c37641406a641632443ecaa546c10
-
SHA1
8da43e2bbfb019c370e028c5914e6fdad4288e95
-
SHA256
ad84d652581c49c7a966d4a581543b17b07b1c10b9cd5d9529cf955071210ce2
-
SHA512
92f6e33c990d13e8901fd413df97a0a2b00a4fedd022f76336a6f2fc67d5d3e537c6edf697247582123a941771916ed78938d1405feb922db70ac518c1916cc8
-
SSDEEP
768:rc05slHBjNk91nSZWn2StE83/8WsgWp8M:rc05Ehja9ZtnhdA78
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 1456 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1456 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/memory/2060-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral3/memory/2060-11-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral3/memory/2060-23-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\msimg32.dll 10.exe File created C:\Windows\SysWOW64\sysapp19.dll 10.exe File created C:\Windows\SysWOW64\ksuser.dll 10.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 10.exe File created C:\Windows\SysWOW64\midimap.dll 10.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 10.exe File created C:\Windows\SysWOW64\yumsimg32.dll 10.exe File created C:\Windows\SysWOW64\msimg32.dll 10.exe File created C:\Windows\SysWOW64\yuksuser.dll 10.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 10.exe File created C:\Windows\SysWOW64\yumidimap.dll 10.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2780 sc.exe 2332 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2060 10.exe 2060 10.exe 2060 10.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 10.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2208 2060 10.exe 28 PID 2060 wrote to memory of 2208 2060 10.exe 28 PID 2060 wrote to memory of 2208 2060 10.exe 28 PID 2060 wrote to memory of 2208 2060 10.exe 28 PID 2060 wrote to memory of 2780 2060 10.exe 30 PID 2060 wrote to memory of 2780 2060 10.exe 30 PID 2060 wrote to memory of 2780 2060 10.exe 30 PID 2060 wrote to memory of 2780 2060 10.exe 30 PID 2060 wrote to memory of 2332 2060 10.exe 32 PID 2060 wrote to memory of 2332 2060 10.exe 32 PID 2060 wrote to memory of 2332 2060 10.exe 32 PID 2060 wrote to memory of 2332 2060 10.exe 32 PID 2208 wrote to memory of 2704 2208 net.exe 34 PID 2208 wrote to memory of 2704 2208 net.exe 34 PID 2208 wrote to memory of 2704 2208 net.exe 34 PID 2208 wrote to memory of 2704 2208 net.exe 34 PID 2060 wrote to memory of 1456 2060 10.exe 37 PID 2060 wrote to memory of 1456 2060 10.exe 37 PID 2060 wrote to memory of 1456 2060 10.exe 37 PID 2060 wrote to memory of 1456 2060 10.exe 37 PID 2060 wrote to memory of 1456 2060 10.exe 37 PID 2060 wrote to memory of 1456 2060 10.exe 37 PID 2060 wrote to memory of 1456 2060 10.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ViRuS\10.exe"C:\Users\Admin\AppData\Local\Temp\ViRuS\10.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:2704
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1703825015.dat, ServerMain c:\users\admin\appdata\local\temp\virus\10.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5684b9a54be3e2d5ba4aab54e99cf21c7
SHA1cf3b2bcd2a82667d16d0c375edd082e325976548
SHA256ca3a15613d99fdbe84e35422c3a564bf18f3ea225885bc3b5696c1eb32d35881
SHA512dfd7d5acf5898e8d0f784783696bc6208c6c004f38da571bf41c8d3236c7cdef8f75e6998bd654d7461169eb45569fc9fde275a213549e1fcdafeba6b649bf4d