Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 14:53

General

  • Target

    VirusShare_8ec363843a850f67ebad036bb4d18efd.exe

  • Size

    186KB

  • MD5

    8ec363843a850f67ebad036bb4d18efd

  • SHA1

    ac856eb04ca1665b10bed5a1757f193ff56aca02

  • SHA256

    27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8

  • SHA512

    800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684

  • SSDEEP

    3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5

Malware Config

Signatures

  • Contacts a large (16398) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Adds Run key to start application
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Users\Admin\AppData\Roaming\{7B88A631-9DB0-95C8-FE5C-A999350AECED}\help.exe
      "C:\Users\Admin\AppData\Roaming\{7B88A631-9DB0-95C8-FE5C-A999350AECED}\help.exe"
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      PID:4992
    • C:\Windows\SysWOW64\cmd.exe
      /d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4696
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 1 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:5584
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3984 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2484
    • C:\Users\Admin\AppData\Roaming\{7B88A631-9DB0-95C8-FE5C-A999350AECED}\help.exe
      C:\Users\Admin\AppData\Roaming\{7B88A631-9DB0-95C8-FE5C-A999350AECED}\help.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3972
    • C:\Users\Admin\AppData\Roaming\{7B88A631-9DB0-95C8-FE5C-A999350AECED}\help.exe
      C:\Users\Admin\AppData\Roaming\{7B88A631-9DB0-95C8-FE5C-A999350AECED}\help.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\help.lnk

      Filesize

      1KB

      MD5

      abeb2e5ad57773ef9583322e2b02b618

      SHA1

      c84a8d85322459dc49279286572a7017a8ae60ac

      SHA256

      16e222f2415a4efbfc8e50c69b6c775a7221b1ba33f5f81dffbb25755110c7a4

      SHA512

      3aa20cff5f6786d68a13fc238ab95a7ef1bca010a46d097779ebd83fd7b3fa79b8445e96fdb26415729266a1a24368574449c254d6c01f90ead50a0579e5ca18

    • C:\Users\Admin\AppData\Roaming\{7B88A631-9DB0-95C8-FE5C-A999350AECED}\help.exe

      Filesize

      186KB

      MD5

      8ec363843a850f67ebad036bb4d18efd

      SHA1

      ac856eb04ca1665b10bed5a1757f193ff56aca02

      SHA256

      27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8

      SHA512

      800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684

    • memory/3972-28-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/3972-27-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4620-1-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4620-2-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4620-0-0x0000000000D10000-0x0000000000D31000-memory.dmp

      Filesize

      132KB

    • memory/4620-13-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4992-10-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/4992-17-0x00000000067A0000-0x00000000067A1000-memory.dmp

      Filesize

      4KB

    • memory/4992-21-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/4992-22-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/4992-12-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/4992-11-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/5844-37-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/5844-38-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB