Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 19:01
Behavioral task
behavioral1
Sample
VirusShare_ed3ed37f0130793314c40073c3017a5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_ed3ed37f0130793314c40073c3017a5c.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_ed3ed37f0130793314c40073c3017a5c.exe
-
Size
52KB
-
MD5
ed3ed37f0130793314c40073c3017a5c
-
SHA1
dc4086219f315457b5b7d80b54a6a220140c6481
-
SHA256
c204fa860261b312da6522cf36ead3a4f8279d59d7c4c1d40417b76633fdbda1
-
SHA512
eba6620418bac4398317b0796272901f241757aad5f29e760a085bbaddf7889c830f21b215f8fe7c088cc98b21ebe0a6173e38914b30f4d6c9c582d3fc2506ca
-
SSDEEP
1536:cCM2LNW+RfAFqkuK9crRoj+tJC3oNRsVGtLytwOU:k2pW+tAGKGRoOJaoNKASO
Malware Config
Signatures
-
Renames multiple (947) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2812 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2936-0-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2936-605-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2936-1086-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2936-1221-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2936-1636-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2936-2041-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2936-2298-0x0000000000400000-0x0000000000479000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT-3.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Apia VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\release VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Swift_Current VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\Salta.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Gaza.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ashgabat.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Choibalsan VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Guadalcanal.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceYi.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\Beulah VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Brussels.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Rothera VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Pyongyang.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\EST5EDT VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\MoveExpand.csv VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-4.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\America\Costa_Rica.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Mexico_City VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\dblook VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cambridge_Bay VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guyana VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nipigon.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Nicosia.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\classlist.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Bahia_Banderas.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Palau VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\EET VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guatemala VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT+7.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Edmonton VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Anadyr VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Beirut.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\London.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceSimplifiedShuangPin.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Omsk VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\Tell_City.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\sentinel.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Phoenix VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Guam VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Adelaide.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EST VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Pago_Pago.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Panama VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Brussels VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Urumqi.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Seoul.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Macau.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4ADT VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\README.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Mozilla Firefox\postSigningData.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Dawson VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\Vincennes.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Lindeman VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AppConfigurationInternal.zip VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre7\lib\zi\America\Denver.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Class.zip VirusShare_ed3ed37f0130793314c40073c3017a5c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1544 notepad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1544 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 31 PID 2936 wrote to memory of 1544 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 31 PID 2936 wrote to memory of 1544 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 31 PID 2936 wrote to memory of 1544 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 31 PID 2936 wrote to memory of 2812 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 32 PID 2936 wrote to memory of 2812 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 32 PID 2936 wrote to memory of 2812 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 32 PID 2936 wrote to memory of 2812 2936 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_ed3ed37f0130793314c40073c3017a5c.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_ed3ed37f0130793314c40073c3017a5c.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\README_ASAP.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE" >> NUL2⤵
- Deletes itself
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a0bca63c8ba75cf1b7a30d0b171f474f
SHA1af8a8153d52ee5d471e7f69b2245683b441b7b7d
SHA256fdac2db3a1b1d199162e8768be32cc0c9e7161556b840c24c7e1928ac3f3f531
SHA5120d68622772132d80fda645fa7cbd45eed8cd5f876da359f4aa735c56adfca949f7b77843301d8f6da26e89ade67daa3341f2edf0d0bcde08599a362b1abdc002