Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 16:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VirusShare_15b406601992e80b9f5a22448a7df1f2.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
VirusShare_15b406601992e80b9f5a22448a7df1f2.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
VirusShare_15b406601992e80b9f5a22448a7df1f2.exe
-
Size
58KB
-
MD5
15b406601992e80b9f5a22448a7df1f2
-
SHA1
5213baac74fd04cdd846efb1656cd70a423d130d
-
SHA256
0ace1841939b63f43f033ab096b61846f373b359d9c927096752d88c437bcbb6
-
SHA512
10ad5e8047a459569d0ac3baeb3db414a6459a0222b65e4bbb39c45eba01fa59679f5d2fc785eafd53a35f5d01f7261d8bbd4f5ecd019b1401ad69d260279b85
-
SSDEEP
1536:p3kwY3zkrGpVKMZKpJFyO6tXp3EoIDQ4KSk:p32JK0SFb6tXW7CS
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1340 VirusShare_15b406601992e80b9f5a22448a7df1f2.exe 2580 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe 2580 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1340 VirusShare_15b406601992e80b9f5a22448a7df1f2.exe 1340 VirusShare_15b406601992e80b9f5a22448a7df1f2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2580 svchost.exe 2580 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1348 2580 svchost.exe 31 PID 2580 wrote to memory of 1348 2580 svchost.exe 31 PID 2580 wrote to memory of 1348 2580 svchost.exe 31 PID 2580 wrote to memory of 1348 2580 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_15b406601992e80b9f5a22448a7df1f2.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_15b406601992e80b9f5a22448a7df1f2.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1340
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:1348
-