Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 15:47

General

  • Target

    VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe

  • Size

    328KB

  • MD5

    50f77a64e5ec62c61c06c3d47352e0a6

  • SHA1

    0e4b3c6c0d2f0df6970b15d6f65026146f704921

  • SHA256

    8c18ffa11d19588df55c3d2938a3a0e37bedadc4e6c0ffe7a1d6264a370a8efb

  • SHA512

    945b861f1396b33b1c6eccd4602d238f308236934bb3afe07071d58cf8bf2c1d01dac5a7767ab1e1f22b33e8b1116b732eb49090185563a7357140ca3de15ca8

  • SSDEEP

    6144:+X3NlYQGajaevTlpRM2k1Pt+LCJ8kOp4x1mMwO9eGGxMbaCw3ovUcw:23XtRja8hE2kT+LBXpDMjefxOaCw3oVw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
    1⤵
      PID:3024
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:2280
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:2632
        • C:\Users\Admin\AppData\Local\Temp\VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe
          "C:\Users\Admin\AppData\Local\Temp\VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe"
          1⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Users\Admin\AppData\Roaming\Viygl\xeaha.exe
            "C:\Users\Admin\AppData\Roaming\Viygl\xeaha.exe"
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4088
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpea5f7892.bat"
            2⤵
              PID:3336
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:4412
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:3444
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:3996
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:3904
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3840
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                      1⤵
                        PID:3748
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                        1⤵
                          PID:3572
                        • C:\Windows\Explorer.EXE
                          C:\Windows\Explorer.EXE
                          1⤵
                            PID:3364
                          • C:\Windows\system32\taskhostw.exe
                            taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                            1⤵
                              PID:2836
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                              1⤵
                                PID:2460
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                1⤵
                                  PID:2432

                                Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\tmpea5f7892.bat

                                        Filesize

                                        265B

                                        MD5

                                        d6643b5374d74d49e45c34b1e39a2672

                                        SHA1

                                        11a95def7680f3d1b8c57bbf25c4a08825e4690e

                                        SHA256

                                        5fcc99d8957717fc94d9959bc25d37f1473b36b6432f679f82ad0d2ccce9802a

                                        SHA512

                                        01b4019a74e2a3c22fccb5d4d4f2befd2f51dae27b6b4238aef75b72eb74fa9f0fa256085688448b51677e88c92aede74922b0bf2d798277344ca692d3ba709b

                                      • C:\Users\Admin\AppData\Roaming\Viygl\xeaha.exe

                                        Filesize

                                        176KB

                                        MD5

                                        c12ae570da4d64fa1280feebf1616579

                                        SHA1

                                        d2819746982062afb2379979dc79d239b90c61ea

                                        SHA256

                                        501430ea2a812d059f40fa4c9cf9d5507a5cca52621a8e03616fe3450bade4c2

                                        SHA512

                                        8c2af1fe0a3c6da7b383473d43247b3d693389d7c9cd1d31f0433d0548c80ee5d6a8e5637e529b63b03fe934c7c28cc5f009a6f3a5293ebb92dd1d7ee5a3a25a

                                      • C:\Users\Admin\AppData\Roaming\Viygl\xeaha.exe

                                        Filesize

                                        97KB

                                        MD5

                                        c2752ab0303398924a1f35817f5d6f71

                                        SHA1

                                        5bb6fba0f08bcf6b25261af053c607570d63f49b

                                        SHA256

                                        92dfb1c67eeffd06826ba4182ecebf0560afee8369fe33745767b4d959164b26

                                        SHA512

                                        d213a81758d5803d9fd5bd846e39eb5c3c456100cc74ae58a98fe450543238ef746198663ac1b8e19d74861f83b11c28ea7a384f2fe2761947608fc9fa7830ed

                                      • memory/1784-3-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-12-0x0000000002300000-0x0000000002346000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-4-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-13-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1784-16-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1784-32-0x0000000002220000-0x0000000002266000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-27-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-2-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-14-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1784-15-0x0000000002300000-0x0000000002346000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-1-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-17-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1784-18-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1784-0-0x0000000002220000-0x0000000002266000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-19-0x0000000002300000-0x0000000002346000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/1784-20-0x0000000002300000-0x0000000002346000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/3336-38-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3336-34-0x0000000000D60000-0x0000000000DA6000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/3336-35-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3336-23-0x0000000000D60000-0x0000000000DA6000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/3336-36-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3336-37-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3336-39-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3336-41-0x0000000000D60000-0x0000000000DA6000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/3336-40-0x0000000000D60000-0x0000000000DA6000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/3336-33-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4088-24-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/4088-11-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/4088-25-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/4088-10-0x0000000000670000-0x00000000006B6000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/4088-44-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/4088-45-0x0000000000400000-0x0000000000446000-memory.dmp

                                        Filesize

                                        280KB