Analysis
-
max time kernel
131s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_8926cecf11c74e10589cab65ba6bf580.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
virussign.com_8926cecf11c74e10589cab65ba6bf580.exe
Resource
win10v2004-20240508-en
General
-
Target
virussign.com_8926cecf11c74e10589cab65ba6bf580.exe
-
Size
55KB
-
MD5
8926cecf11c74e10589cab65ba6bf580
-
SHA1
acad9bec360a488cbdc34527deb39af442f14bd4
-
SHA256
d3ca45dfbdf1156990b4eeba1282d2e3f42131b3748a356e1cfe54557f4cdab1
-
SHA512
9d7ae6ef11b8dc2532b026e0b370d2374d2651c29652475ccefb708fda38b6d67e9be489fe6f71ff0000f88b7a240ba83d80dc32f872a2cb05a6b5914e494ff9
-
SSDEEP
768:MApQr0DHvdFJI34nGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7Asc:MAaAJlzsh7pWezEPJB+Ok
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation virussign.com_8926cecf11c74e10589cab65ba6bf580.exe -
Executes dropped EXE 1 IoCs
pid Process 4484 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe virussign.com_8926cecf11c74e10589cab65ba6bf580.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 4484 2152 virussign.com_8926cecf11c74e10589cab65ba6bf580.exe 83 PID 2152 wrote to memory of 4484 2152 virussign.com_8926cecf11c74e10589cab65ba6bf580.exe 83 PID 2152 wrote to memory of 4484 2152 virussign.com_8926cecf11c74e10589cab65ba6bf580.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_8926cecf11c74e10589cab65ba6bf580.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_8926cecf11c74e10589cab65ba6bf580.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:4484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5a52fefe0b628d8f8340da7582803ffb5
SHA164b8a8ce65a50a026dc73aef6a52d35406100f3a
SHA25663fbf8e8d3068de9c1f4de5d6ea85a5c7302d74aafd2ddaccb4a5dc6cad8154f
SHA512a6df5347dc88cb35509e5cdf7e2ecae8b752b199e3213dcf30fdd39a88a64a9b2e2f19c6556a2a82c19df222f9c3e76fd2e5162a028a10f14b982f3ab47d1f4b