Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe
-
Size
169KB
-
MD5
9c7e84113b329bea497d963db2ab8bf5
-
SHA1
27bc2abc7816401130289e916a9c4224fbf1dc87
-
SHA256
ff23a9eca12dc9f585a201f12907bc04df670dc759277cfe402a3924a0e49adb
-
SHA512
0c098b40a9c268ac8f5b89ecbbaee59155c5b2ea7888eab22239f5fed111e406b900b9db02620a291f468624c0b3e6f1a17d11969d6310a7fa925feca08a94b0
-
SSDEEP
3072:8LbjKmmfcRygt+sX4LdVZtJ6rrRczBpb6K3yGHw6rI2Z+yAV1NiP1ry:8LPK/fcRVnIHZtSrRc9cMk6kfiry
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2728 netsh.exe -
Deletes itself 1 IoCs
pid Process 1556 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 xeahogu.exe -
Loads dropped DLL 2 IoCs
pid Process 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6E010F17-D062-3D91-93E7-0EA65539B0E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Etlau\\xeahogu.exe" xeahogu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Privacy VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\10B352EA-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe 2684 xeahogu.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe Token: SeSecurityPrivilege 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe Token: SeSecurityPrivilege 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe Token: SeManageVolumePrivilege 1764 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1764 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1764 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 2684 xeahogu.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2688 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 28 PID 2268 wrote to memory of 2688 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 28 PID 2268 wrote to memory of 2688 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 28 PID 2268 wrote to memory of 2688 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 28 PID 2268 wrote to memory of 2684 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 30 PID 2268 wrote to memory of 2684 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 30 PID 2268 wrote to memory of 2684 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 30 PID 2268 wrote to memory of 2684 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 30 PID 2688 wrote to memory of 2728 2688 cmd.exe 31 PID 2688 wrote to memory of 2728 2688 cmd.exe 31 PID 2688 wrote to memory of 2728 2688 cmd.exe 31 PID 2688 wrote to memory of 2728 2688 cmd.exe 31 PID 2684 wrote to memory of 1116 2684 xeahogu.exe 13 PID 2684 wrote to memory of 1116 2684 xeahogu.exe 13 PID 2684 wrote to memory of 1116 2684 xeahogu.exe 13 PID 2684 wrote to memory of 1116 2684 xeahogu.exe 13 PID 2684 wrote to memory of 1116 2684 xeahogu.exe 13 PID 2684 wrote to memory of 1176 2684 xeahogu.exe 14 PID 2684 wrote to memory of 1176 2684 xeahogu.exe 14 PID 2684 wrote to memory of 1176 2684 xeahogu.exe 14 PID 2684 wrote to memory of 1176 2684 xeahogu.exe 14 PID 2684 wrote to memory of 1176 2684 xeahogu.exe 14 PID 2684 wrote to memory of 1220 2684 xeahogu.exe 21 PID 2684 wrote to memory of 1220 2684 xeahogu.exe 21 PID 2684 wrote to memory of 1220 2684 xeahogu.exe 21 PID 2684 wrote to memory of 1220 2684 xeahogu.exe 21 PID 2684 wrote to memory of 1220 2684 xeahogu.exe 21 PID 2684 wrote to memory of 1668 2684 xeahogu.exe 22 PID 2684 wrote to memory of 1668 2684 xeahogu.exe 22 PID 2684 wrote to memory of 1668 2684 xeahogu.exe 22 PID 2684 wrote to memory of 1668 2684 xeahogu.exe 22 PID 2684 wrote to memory of 1668 2684 xeahogu.exe 22 PID 2684 wrote to memory of 2268 2684 xeahogu.exe 27 PID 2684 wrote to memory of 2268 2684 xeahogu.exe 27 PID 2684 wrote to memory of 2268 2684 xeahogu.exe 27 PID 2684 wrote to memory of 2268 2684 xeahogu.exe 27 PID 2684 wrote to memory of 2268 2684 xeahogu.exe 27 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2268 wrote to memory of 1556 2268 VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe 33 PID 2684 wrote to memory of 896 2684 xeahogu.exe 35 PID 2684 wrote to memory of 896 2684 xeahogu.exe 35 PID 2684 wrote to memory of 896 2684 xeahogu.exe 35 PID 2684 wrote to memory of 896 2684 xeahogu.exe 35 PID 2684 wrote to memory of 896 2684 xeahogu.exe 35 PID 2684 wrote to memory of 2580 2684 xeahogu.exe 36 PID 2684 wrote to memory of 2580 2684 xeahogu.exe 36 PID 2684 wrote to memory of 2580 2684 xeahogu.exe 36 PID 2684 wrote to memory of 2580 2684 xeahogu.exe 36 PID 2684 wrote to memory of 2580 2684 xeahogu.exe 36 PID 2684 wrote to memory of 2380 2684 xeahogu.exe 39 PID 2684 wrote to memory of 2380 2684 xeahogu.exe 39 PID 2684 wrote to memory of 2380 2684 xeahogu.exe 39 PID 2684 wrote to memory of 2380 2684 xeahogu.exe 39 PID 2684 wrote to memory of 2380 2684 xeahogu.exe 39
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe8b43860.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="explore" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\Etlau\xeahogu.exe"4⤵
- Modifies Windows Firewall
PID:2728
-
-
-
C:\Users\Admin\AppData\Roaming\Etlau\xeahogu.exe"C:\Users\Admin\AppData\Roaming\Etlau\xeahogu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp601086aa.bat"3⤵
- Deletes itself
PID:1556
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1668
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1764
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:896
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5ec935767d3210b4d879a314d1c66332b
SHA1903b6775a92e64b7f91eef838f2e87038cb11859
SHA25684f7dbce61ef67409bc10fb06fb7429d725a78c04d45a212dc7c74fdcd4a3cdf
SHA512e75fab3d8473a66c3ac0fc8a59dd527bf2845d475f93125515c9e09e38e48f2491dbac5a2d7158ff3ff656a9998665bd88a2e7d3294ffc8eaa7262a5dc5b0a12
-
Filesize
265B
MD5e581acc3a4f2174923c7ca34737ce7f9
SHA11e39be33467c5c5235f9bade58c45468f91f7c10
SHA2562ebc0301b5568afbd88af2aad2334ebb41801f6eef05ce2a0dc13ddb60eb8c18
SHA512cc35b0bc42cd62ff48119fc91e308e1473704be996474368a6c607ab27d3551b78a154a0bdf28e35c7d865f2c507463b35d91ce72279017a376a2d40dde4d60c
-
Filesize
202B
MD54e574e22b058c9c4a457a6ff97afa305
SHA18aa3fe6d35856f14cabd80db0146844418143433
SHA2567b423a533cc2ba072220630ee6f750997081f153a51c146789ef1d13302461ab
SHA512e796712990e34e3adea8027b77966b11aa3576cedc5067ddb043b0e2d52bb85e5978ece9dc26432acacc67d8bcecd6b86bc3ccb4dc4696a6a6278e6b160c86c8
-
Filesize
377B
MD58bff5e047b7a291c0cdc52264c2baf6c
SHA184fd5e9a02df9f265f3a646f4189c532f9e7ec14
SHA25609c962599f3e8d08c810ebd1d87b04875f9d0a8231ce1afc638dddd6c19e8069
SHA5126370caf7129631a393e52c15b5f65a41abd4fc264f34b4a9308c72bca1197b420b397346ffac2df6ac0947d81c592bca0ef0a2eb0f2c6c4cd4319f408cb30e39
-
Filesize
169KB
MD52d2bc760998abe8ecd9fd8221abed940
SHA1f6d5e499059866f2e93094284b6b22f4a58713ea
SHA2560eb06dedff96ef0528d2483352e4b2149738c0322d44cf0d1f590751b4bef420
SHA5125c1934c78f342c1486026dad7d6f53c65d502d2e81f1e4434a83838bef012d4117fb4b6816e44c74981ee560767f8e5a96016a8087aa5ff5888c0eee303adc79