Analysis

  • max time kernel
    131s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 17:01

General

  • Target

    virussign.com_8926cecf11c74e10589cab65ba6bf580.exe

  • Size

    55KB

  • MD5

    8926cecf11c74e10589cab65ba6bf580

  • SHA1

    acad9bec360a488cbdc34527deb39af442f14bd4

  • SHA256

    d3ca45dfbdf1156990b4eeba1282d2e3f42131b3748a356e1cfe54557f4cdab1

  • SHA512

    9d7ae6ef11b8dc2532b026e0b370d2374d2651c29652475ccefb708fda38b6d67e9be489fe6f71ff0000f88b7a240ba83d80dc32f872a2cb05a6b5914e494ff9

  • SSDEEP

    768:MApQr0DHvdFJI34nGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7Asc:MAaAJlzsh7pWezEPJB+Ok

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\virussign.com_8926cecf11c74e10589cab65ba6bf580.exe
    "C:\Users\Admin\AppData\Local\Temp\virussign.com_8926cecf11c74e10589cab65ba6bf580.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:4484

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\sal.exe

          Filesize

          55KB

          MD5

          a52fefe0b628d8f8340da7582803ffb5

          SHA1

          64b8a8ce65a50a026dc73aef6a52d35406100f3a

          SHA256

          63fbf8e8d3068de9c1f4de5d6ea85a5c7302d74aafd2ddaccb4a5dc6cad8154f

          SHA512

          a6df5347dc88cb35509e5cdf7e2ecae8b752b199e3213dcf30fdd39a88a64a9b2e2f19c6556a2a82c19df222f9c3e76fd2e5162a028a10f14b982f3ab47d1f4b

        • memory/2152-0-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2152-10-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/4484-9-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB