Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe
-
Size
146KB
-
MD5
f4b54fc054606d9cc7cb5cde04df1a9b
-
SHA1
72e6c398e3a27136a7dee0c85d01b5e37a8926ba
-
SHA256
b9761d12044c02adb84dee1efc641fd721e91ea480c6628b66da0c05b197a38d
-
SHA512
fa7912670b76a08267e63e4fcab5d9d644f5e4fc99a90891fccf4ca0956eef96e738ea742cb37f6efced847f03caf25df11c5f0f6f64628775e8ad3a8196dbb3
-
SSDEEP
3072:16mCoCc+6tLs1w+GgJDppjc9rRk9Fl4Unmat8ZMle1N5EAGBrYhVP:16mCLc7s1w+tqrR6l4Umat8Glef2Aerg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 equkt.exe -
Loads dropped DLL 4 IoCs
pid Process 1748 cmd.exe 1748 cmd.exe 2000 equkt.exe 2000 equkt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1152 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2776 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 equkt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2000 equkt.exe 2000 equkt.exe 2000 equkt.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2000 equkt.exe 2000 equkt.exe 2000 equkt.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1748 2928 VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe 28 PID 2928 wrote to memory of 1748 2928 VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe 28 PID 2928 wrote to memory of 1748 2928 VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe 28 PID 2928 wrote to memory of 1748 2928 VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe 28 PID 1748 wrote to memory of 1152 1748 cmd.exe 30 PID 1748 wrote to memory of 1152 1748 cmd.exe 30 PID 1748 wrote to memory of 1152 1748 cmd.exe 30 PID 1748 wrote to memory of 1152 1748 cmd.exe 30 PID 1748 wrote to memory of 2776 1748 cmd.exe 32 PID 1748 wrote to memory of 2776 1748 cmd.exe 32 PID 1748 wrote to memory of 2776 1748 cmd.exe 32 PID 1748 wrote to memory of 2776 1748 cmd.exe 32 PID 1748 wrote to memory of 2000 1748 cmd.exe 33 PID 1748 wrote to memory of 2000 1748 cmd.exe 33 PID 1748 wrote to memory of 2000 1748 cmd.exe 33 PID 1748 wrote to memory of 2000 1748 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2928 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe" & start C:\Users\Admin\AppData\Local\equkt.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 29283⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2776
-
-
C:\Users\Admin\AppData\Local\equkt.exeC:\Users\Admin\AppData\Local\equkt.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD5f4b54fc054606d9cc7cb5cde04df1a9b
SHA172e6c398e3a27136a7dee0c85d01b5e37a8926ba
SHA256b9761d12044c02adb84dee1efc641fd721e91ea480c6628b66da0c05b197a38d
SHA512fa7912670b76a08267e63e4fcab5d9d644f5e4fc99a90891fccf4ca0956eef96e738ea742cb37f6efced847f03caf25df11c5f0f6f64628775e8ad3a8196dbb3