Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 18:35

General

  • Target

    virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe

  • Size

    53KB

  • MD5

    62affd7a3914bc44bc3b29cc91d5e400

  • SHA1

    ab90b65b77a92aa2113620788524e4a9ec54f6eb

  • SHA256

    3ba7e0cce53adce9d0e1c484c4549e5f211e3b7095b7d1a9d78aa46c8e3f1582

  • SHA512

    afbec1ffd522aec93fbc1f38683d17c392bd81ba942ff8abb78acd18ec91f2cd8f453cf2c4cc1b08822ad08e00f3fac27c64a01b2b57230b1760dbdc8fe85b4b

  • SSDEEP

    1536:vNhg8r8QyQbRt7Kp3StjEMjmLM3ztDJWZsXy4JzxPMU:KQbRtJJjmLM3zRJWZsXy4J9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe
    "C:\Users\Admin\AppData\Local\Temp\virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\gdjif.exe
      "C:\Users\Admin\gdjif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gdjif.exe

    Filesize

    53KB

    MD5

    69e0feb4c449ba8e0858b2a666684526

    SHA1

    e8070264685976c1471931b12abe50385b38b419

    SHA256

    78d6db5aaae6c7a4ec5dc2dad13de18c1ac3f7a3cefaa1b837a57ea733b38afd

    SHA512

    09d20365e460de40e67523ae440d5e4767adba67e448273acea5fd2e282f250c8bde3efa3c8b7c169500ee4db7ce86940da2e272517998d08742f7940ceebf28

  • memory/700-34-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2812-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB