Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 19:01
Behavioral task
behavioral1
Sample
VirusShare_ed3ed37f0130793314c40073c3017a5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_ed3ed37f0130793314c40073c3017a5c.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_ed3ed37f0130793314c40073c3017a5c.exe
-
Size
52KB
-
MD5
ed3ed37f0130793314c40073c3017a5c
-
SHA1
dc4086219f315457b5b7d80b54a6a220140c6481
-
SHA256
c204fa860261b312da6522cf36ead3a4f8279d59d7c4c1d40417b76633fdbda1
-
SHA512
eba6620418bac4398317b0796272901f241757aad5f29e760a085bbaddf7889c830f21b215f8fe7c088cc98b21ebe0a6173e38914b30f4d6c9c582d3fc2506ca
-
SSDEEP
1536:cCM2LNW+RfAFqkuK9crRoj+tJC3oNRsVGtLytwOU:k2pW+tAGKGRoOJaoNKASO
Malware Config
Signatures
-
Renames multiple (425) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation VirusShare_ed3ed37f0130793314c40073c3017a5c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3116-0-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral2/memory/3116-759-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral2/memory/3116-1384-0x0000000000400000-0x0000000000479000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\io.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\notice.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MLModels\autofill_labeling_features.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\ssn_high_group_info.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\JSByteCodeCache_64 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\tzmappings.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Sigma\Entities VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\client_eula.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\notice.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ThirdPartyNotices.MSHWLatin.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk-1.8\jre\COPYRIGHT.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\blacklist.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\meta-index VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\TURKISH.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\Social VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub_M365_eula.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\card_terms_dict.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1250.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\README_th_en_CA_v2.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\History.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jvisualvm.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\tzmappings VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre-1.8\release.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\Cryptomining.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\METCONV.TXT VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1254.TXT VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1257.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\7-Zip\Lang\ka.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\WidevineCdm\LICENSE.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\7-Zip\Lang\vi.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Java\jre-1.8\lib\security\blacklist.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Java\jre-1.8\README.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\license.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\7-Zip\Lang\nb.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\SkypeForBusinessVDI2019_eula.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketchAppService\ReadMe.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Sigma\Cryptomining VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\7-Zip\Lang\ar.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\7-Zip\Lang\hu.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files\7-Zip\Lang\kk.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\LICENSE VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\about_Mocking.help.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\WidevineCdm\LICENSE VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\Added.txt VirusShare_ed3ed37f0130793314c40073c3017a5c.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\Advertising.txx VirusShare_ed3ed37f0130793314c40073c3017a5c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4900 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4900 3116 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 92 PID 3116 wrote to memory of 4900 3116 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 92 PID 3116 wrote to memory of 4900 3116 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 92 PID 3116 wrote to memory of 5060 3116 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 93 PID 3116 wrote to memory of 5060 3116 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 93 PID 3116 wrote to memory of 5060 3116 VirusShare_ed3ed37f0130793314c40073c3017a5c.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_ed3ed37f0130793314c40073c3017a5c.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_ed3ed37f0130793314c40073c3017a5c.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\README_ASAP.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE" >> NUL2⤵PID:5060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a0bca63c8ba75cf1b7a30d0b171f474f
SHA1af8a8153d52ee5d471e7f69b2245683b441b7b7d
SHA256fdac2db3a1b1d199162e8768be32cc0c9e7161556b840c24c7e1928ac3f3f531
SHA5120d68622772132d80fda645fa7cbd45eed8cd5f876da359f4aa735c56adfca949f7b77843301d8f6da26e89ade67daa3341f2edf0d0bcde08599a362b1abdc002