Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 22:29
Behavioral task
behavioral1
Sample
VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe
-
Size
327KB
-
MD5
007257eceaceb87c84ac1d75decb6fd5
-
SHA1
3446b0d7bfe20fced963bbc15506f394ffa6984f
-
SHA256
8927ec9212d9d891afa49822761ab726a9a5de1c2938692c25709ec3e80b96a2
-
SHA512
42bfb70bbb8b611fd6603c147e5cd43945c94fb90a6b7a8155dda5218a3f2815c38a74305b3dc1b4f6e054015975cee36683b2014e7cef46856f30e35b3b8d12
-
SSDEEP
6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kIN/zJ:QjkArEN249AyE/rbaMct4bO2/V9l
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral1/memory/2124-0-0x0000000000400000-0x00000000004C1000-memory.dmp UPX behavioral1/memory/2124-14-0x0000000000400000-0x00000000004C1000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2656 server.exe -
Loads dropped DLL 6 IoCs
pid Process 2124 VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe 2124 VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe -
resource yara_rule behavioral1/memory/2124-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/files/0x000d000000012262-7.dat upx behavioral1/memory/2124-15-0x00000000001E0000-0x00000000001ED000-memory.dmp upx behavioral1/memory/2656-17-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/2124-14-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2124-9-0x00000000001E0000-0x00000000001ED000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2124-14-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2864 2656 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2656 2124 VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe 28 PID 2124 wrote to memory of 2656 2124 VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe 28 PID 2124 wrote to memory of 2656 2124 VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe 28 PID 2124 wrote to memory of 2656 2124 VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe 28 PID 2656 wrote to memory of 2864 2656 server.exe 29 PID 2656 wrote to memory of 2864 2656 server.exe 29 PID 2656 wrote to memory of 2864 2656 server.exe 29 PID 2656 wrote to memory of 2864 2656 server.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare-007257eceaceb87c84ac1d75decb6fd5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5f560832f5c715b27f635e4be7d93fefe
SHA12a4219fad5c7f42d7fe05969551abdae0c4574cd
SHA256c0e6392d10fc80bb1c7b7690f2b9a34bef252b241e947a55a3c3246d19fa1988
SHA512cf12a232718de4cb5a5916c6b36132780dc1c5ff3e645b038300c7b267fd1b145e79172a0785e7bf683610e231ba58c257bae1bd552f93cb5cca8618fbd6580d