Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe
-
Size
328KB
-
MD5
50f77a64e5ec62c61c06c3d47352e0a6
-
SHA1
0e4b3c6c0d2f0df6970b15d6f65026146f704921
-
SHA256
8c18ffa11d19588df55c3d2938a3a0e37bedadc4e6c0ffe7a1d6264a370a8efb
-
SHA512
945b861f1396b33b1c6eccd4602d238f308236934bb3afe07071d58cf8bf2c1d01dac5a7767ab1e1f22b33e8b1116b732eb49090185563a7357140ca3de15ca8
-
SSDEEP
6144:+X3NlYQGajaevTlpRM2k1Pt+LCJ8kOp4x1mMwO9eGGxMbaCw3ovUcw:23XtRja8hE2kT+LBXpDMjefxOaCw3oVw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4088 xeaha.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{7588220F-556D-BCA0-3499-4D1AF96C5718} = "C:\\Users\\Admin\\AppData\\Roaming\\Viygl\\xeaha.exe" xeaha.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1784 set thread context of 3336 1784 VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe 89 -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe 4088 xeaha.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 4088 1784 VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe 87 PID 1784 wrote to memory of 4088 1784 VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe 87 PID 1784 wrote to memory of 4088 1784 VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe 87 PID 4088 wrote to memory of 2432 4088 xeaha.exe 57 PID 4088 wrote to memory of 2432 4088 xeaha.exe 57 PID 4088 wrote to memory of 2432 4088 xeaha.exe 57 PID 4088 wrote to memory of 2432 4088 xeaha.exe 57 PID 4088 wrote to memory of 2432 4088 xeaha.exe 57 PID 4088 wrote to memory of 2460 4088 xeaha.exe 55 PID 4088 wrote to memory of 2460 4088 xeaha.exe 55 PID 4088 wrote to memory of 2460 4088 xeaha.exe 55 PID 4088 wrote to memory of 2460 4088 xeaha.exe 55 PID 4088 wrote to memory of 2460 4088 xeaha.exe 55 PID 4088 wrote to memory of 2836 4088 xeaha.exe 48 PID 4088 wrote to memory of 2836 4088 xeaha.exe 48 PID 4088 wrote to memory of 2836 4088 xeaha.exe 48 PID 4088 wrote to memory of 2836 4088 xeaha.exe 48 PID 4088 wrote to memory of 2836 4088 xeaha.exe 48 PID 4088 wrote to memory of 3364 4088 xeaha.exe 44 PID 4088 wrote to memory of 3364 4088 xeaha.exe 44 PID 4088 wrote to memory of 3364 4088 xeaha.exe 44 PID 4088 wrote to memory of 3364 4088 xeaha.exe 44 PID 4088 wrote to memory of 3364 4088 xeaha.exe 44 PID 4088 wrote to memory of 3572 4088 xeaha.exe 42 PID 4088 wrote to memory of 3572 4088 xeaha.exe 42 PID 4088 wrote to memory of 3572 4088 xeaha.exe 42 PID 4088 wrote to memory of 3572 4088 xeaha.exe 42 PID 4088 wrote to memory of 3572 4088 xeaha.exe 42 PID 4088 wrote to memory of 3748 4088 xeaha.exe 41 PID 4088 wrote to memory of 3748 4088 xeaha.exe 41 PID 4088 wrote to memory of 3748 4088 xeaha.exe 41 PID 4088 wrote to memory of 3748 4088 xeaha.exe 41 PID 4088 wrote to memory of 3748 4088 xeaha.exe 41 PID 4088 wrote to memory of 3840 4088 xeaha.exe 40 PID 4088 wrote to memory of 3840 4088 xeaha.exe 40 PID 4088 wrote to memory of 3840 4088 xeaha.exe 40 PID 4088 wrote to memory of 3840 4088 xeaha.exe 40 PID 4088 wrote to memory of 3840 4088 xeaha.exe 40 PID 4088 wrote to memory of 3904 4088 xeaha.exe 39 PID 4088 wrote to memory of 3904 4088 xeaha.exe 39 PID 4088 wrote to memory of 3904 4088 xeaha.exe 39 PID 4088 wrote to memory of 3904 4088 xeaha.exe 39 PID 4088 wrote to memory of 3904 4088 xeaha.exe 39 PID 4088 wrote to memory of 3996 4088 xeaha.exe 38 PID 4088 wrote to memory of 3996 4088 xeaha.exe 38 PID 4088 wrote to memory of 3996 4088 xeaha.exe 38 PID 4088 wrote to memory of 3996 4088 xeaha.exe 38 PID 4088 wrote to memory of 3996 4088 xeaha.exe 38 PID 4088 wrote to memory of 3444 4088 xeaha.exe 37 PID 4088 wrote to memory of 3444 4088 xeaha.exe 37 PID 4088 wrote to memory of 3444 4088 xeaha.exe 37 PID 4088 wrote to memory of 3444 4088 xeaha.exe 37 PID 4088 wrote to memory of 3444 4088 xeaha.exe 37 PID 4088 wrote to memory of 4412 4088 xeaha.exe 35 PID 4088 wrote to memory of 4412 4088 xeaha.exe 35 PID 4088 wrote to memory of 4412 4088 xeaha.exe 35 PID 4088 wrote to memory of 4412 4088 xeaha.exe 35 PID 4088 wrote to memory of 4412 4088 xeaha.exe 35 PID 4088 wrote to memory of 3024 4088 xeaha.exe 17 PID 4088 wrote to memory of 3024 4088 xeaha.exe 17 PID 4088 wrote to memory of 3024 4088 xeaha.exe 17 PID 4088 wrote to memory of 3024 4088 xeaha.exe 17 PID 4088 wrote to memory of 3024 4088 xeaha.exe 17 PID 4088 wrote to memory of 2280 4088 xeaha.exe 18
Processes
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3024
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2280
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_50f77a64e5ec62c61c06c3d47352e0a6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\Viygl\xeaha.exe"C:\Users\Admin\AppData\Roaming\Viygl\xeaha.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpea5f7892.bat"2⤵PID:3336
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3444
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3996
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3904
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3840
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3572
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2460
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265B
MD5d6643b5374d74d49e45c34b1e39a2672
SHA111a95def7680f3d1b8c57bbf25c4a08825e4690e
SHA2565fcc99d8957717fc94d9959bc25d37f1473b36b6432f679f82ad0d2ccce9802a
SHA51201b4019a74e2a3c22fccb5d4d4f2befd2f51dae27b6b4238aef75b72eb74fa9f0fa256085688448b51677e88c92aede74922b0bf2d798277344ca692d3ba709b
-
Filesize
176KB
MD5c12ae570da4d64fa1280feebf1616579
SHA1d2819746982062afb2379979dc79d239b90c61ea
SHA256501430ea2a812d059f40fa4c9cf9d5507a5cca52621a8e03616fe3450bade4c2
SHA5128c2af1fe0a3c6da7b383473d43247b3d693389d7c9cd1d31f0433d0548c80ee5d6a8e5637e529b63b03fe934c7c28cc5f009a6f3a5293ebb92dd1d7ee5a3a25a
-
Filesize
97KB
MD5c2752ab0303398924a1f35817f5d6f71
SHA15bb6fba0f08bcf6b25261af053c607570d63f49b
SHA25692dfb1c67eeffd06826ba4182ecebf0560afee8369fe33745767b4d959164b26
SHA512d213a81758d5803d9fd5bd846e39eb5c3c456100cc74ae58a98fe450543238ef746198663ac1b8e19d74861f83b11c28ea7a384f2fe2761947608fc9fa7830ed