Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe
Resource
win10v2004-20240426-en
General
-
Target
virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe
-
Size
65KB
-
MD5
01a41a275fcb2c20cf722f76a78429e0
-
SHA1
2ce65e088cb43ef240d2cbffbef1e729cb09c7a1
-
SHA256
c4e6cdf494928a93a07ef02ad70b9b99b6b789df7dc57b996a6b447ce53faab9
-
SHA512
af8874e113da40e05ed29ec5ca198a0be28403ee80d765bb3d3bf587b897b79466dac95e6a9a14f3ce74ba405a5d518742790c3bd0d06f32186b50d2fcc8f69d
-
SSDEEP
768:3eQIvFKPZo2smEasjcj29NWngAHxcw9ppEaxglaX5uAS:39IvEPZo6Ead29NQgA2wQle56
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2804 ewiuer2.exe 3628 ewiuer2.exe 1172 ewiuer2.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\viesazm.mpk ewiuer2.exe File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\viesazm.mpk ewiuer2.exe File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 396 wrote to memory of 2804 396 virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe 82 PID 396 wrote to memory of 2804 396 virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe 82 PID 396 wrote to memory of 2804 396 virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe 82 PID 2804 wrote to memory of 3628 2804 ewiuer2.exe 95 PID 2804 wrote to memory of 3628 2804 ewiuer2.exe 95 PID 2804 wrote to memory of 3628 2804 ewiuer2.exe 95 PID 3628 wrote to memory of 1172 3628 ewiuer2.exe 96 PID 3628 wrote to memory of 1172 3628 ewiuer2.exe 96 PID 3628 wrote to memory of 1172 3628 ewiuer2.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_01a41a275fcb2c20cf722f76a78429e0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\SysWOW64\ewiuer2.exe /nomove4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1172
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5b3d6c7ba9bdef0c173162d18d372d5e0
SHA1067249b23eae642d9059f80ec4507163fe9fb0af
SHA256461fe2fd8f4be368464db72259d55b54d4db58789ecbaafc04367cee9adb8aed
SHA512d6132858326bf7330a76027e3d4e8c3b70bb8ee80894360c8ebd792708b45bff1974bdd3c1484e8b15f5a9ccd24cdc619952110d88e49b5622555b6e1af3102f
-
Filesize
65KB
MD510c7a44e02783f6514debc618b1ca96d
SHA1c4a8ea97e4de0dacefc9f156042b4bb7b2bf29f7
SHA25631e71b8b1014dbdd25623b51b800c55ef93ff34d685b9049aaf7759d8c385fed
SHA512dcb07f70b5b64fac0b4cee8a2a07a40b32b3e47485645e1ac65be9032d7e0c1411b06646b1864fcaca64de87f9ac842904086db8c57b44f6aac92228a826c884