Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe
Resource
win10v2004-20240508-en
General
-
Target
virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe
-
Size
53KB
-
MD5
62affd7a3914bc44bc3b29cc91d5e400
-
SHA1
ab90b65b77a92aa2113620788524e4a9ec54f6eb
-
SHA256
3ba7e0cce53adce9d0e1c484c4549e5f211e3b7095b7d1a9d78aa46c8e3f1582
-
SHA512
afbec1ffd522aec93fbc1f38683d17c392bd81ba942ff8abb78acd18ec91f2cd8f453cf2c4cc1b08822ad08e00f3fac27c64a01b2b57230b1760dbdc8fe85b4b
-
SSDEEP
1536:vNhg8r8QyQbRt7Kp3StjEMjmLM3ztDJWZsXy4JzxPMU:KQbRtJJjmLM3zRJWZsXy4J9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gdjif.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe -
Executes dropped EXE 1 IoCs
pid Process 700 gdjif.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gdjif = "C:\\Users\\Admin\\gdjif.exe" gdjif.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe 700 gdjif.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2812 virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe 700 gdjif.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 700 2812 virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe 86 PID 2812 wrote to memory of 700 2812 virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe 86 PID 2812 wrote to memory of 700 2812 virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe 86 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82 PID 700 wrote to memory of 2812 700 gdjif.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_62affd7a3914bc44bc3b29cc91d5e400.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\gdjif.exe"C:\Users\Admin\gdjif.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD569e0feb4c449ba8e0858b2a666684526
SHA1e8070264685976c1471931b12abe50385b38b419
SHA25678d6db5aaae6c7a4ec5dc2dad13de18c1ac3f7a3cefaa1b837a57ea733b38afd
SHA51209d20365e460de40e67523ae440d5e4767adba67e448273acea5fd2e282f250c8bde3efa3c8b7c169500ee4db7ce86940da2e272517998d08742f7940ceebf28