Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0c171a59a3dfc56f1dae15aabeec478c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_0c171a59a3dfc56f1dae15aabeec478c.dll
Resource
win10v2004-20231222-en
General
-
Target
VirusShare_0c171a59a3dfc56f1dae15aabeec478c.dll
-
Size
230KB
-
MD5
0c171a59a3dfc56f1dae15aabeec478c
-
SHA1
11ad2d2cd18443e8ba4615c2c745169f8693fa7a
-
SHA256
7ae4acc4e32eca89deacde3130020d8b4d9d6d59c5278bfea9a959d6667d179a
-
SHA512
a8da715a2404c7d422c4763d99e21c020b5a73e1cc1c7d6c7776727dd7e8b133dbb2a42c129350fe4e21d7c075c4185f52fbd2bb5c286b269b0ee520b27b02f6
-
SSDEEP
3072:CPsLPg3ljGfjnUHiuc3WIJp4JI/4m/+65KXwsKf7GxnD:CUojGbiiVoI/2kKXwshD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3648 lsass.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\PROGRA~3\lsass.exe rundll32.exe File created C:\PROGRA~3\c874ceebaa51ead1f65cfd3a95a171c0_erahSsuriV.pad lsass.exe File opened for modification C:\PROGRA~3\c874ceebaa51ead1f65cfd3a95a171c0_erahSsuriV.pad lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1224 3648 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2676 3808 rundll32.exe 84 PID 3808 wrote to memory of 2676 3808 rundll32.exe 84 PID 3808 wrote to memory of 2676 3808 rundll32.exe 84 PID 2676 wrote to memory of 3648 2676 rundll32.exe 85 PID 2676 wrote to memory of 3648 2676 rundll32.exe 85 PID 2676 wrote to memory of 3648 2676 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VirusShare_0c171a59a3dfc56f1dae15aabeec478c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VirusShare_0c171a59a3dfc56f1dae15aabeec478c.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\PROGRA~3\lsass.exeC:\PROGRA~3\lsass.exe C:\Users\Admin\AppData\Local\Temp\VirusShare_0c171a59a3dfc56f1dae15aabeec478c.dll,GOF13⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 8724⤵
- Program crash
PID:1224
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3648 -ip 36481⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641