Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 18:40

General

  • Target

    virussign.com_a61dfe1db60b96e3c07662660c62b660.exe

  • Size

    53KB

  • MD5

    a61dfe1db60b96e3c07662660c62b660

  • SHA1

    fd11f161a76441f0ef1de959d8c6200ea7bd52f8

  • SHA256

    44ca97d686fc263590ed1d27ecfe0685997778339c5b55330e03805b05debacf

  • SHA512

    dfd5ecbeb852e72b36382a01a3bb8a353b1823deb11fb447c8068ae2771c323e4937f930ee21f705b92fdf9cc46aa88db96d209390131638bb343ec81edecf04

  • SSDEEP

    1536:vNng8r8QHCqAGn7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:BCqAGnJJjmLM3zRJWZsXy4JN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\virussign.com_a61dfe1db60b96e3c07662660c62b660.exe
    "C:\Users\Admin\AppData\Local\Temp\virussign.com_a61dfe1db60b96e3c07662660c62b660.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\gbdif.exe
      "C:\Users\Admin\gbdif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3916

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\gbdif.exe

          Filesize

          53KB

          MD5

          5e45075635345dd65bdd01852704d7af

          SHA1

          988bec4396ab9a48e815e3ae22249fce4759d005

          SHA256

          bf67b379d23794562408ea3b34b64b09a9bbf337fdb0378de41199c6040ef2a1

          SHA512

          b1a80ae30af10809be6987fa9592bc482eeed15e439d3d54f84252c2b634f68840a3f624d4df582f85fdc49a316fd5f8fff7549f73949faf5d393ded710cd3c8

        • memory/2104-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3916-34-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB