Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe
-
Size
146KB
-
MD5
f4b54fc054606d9cc7cb5cde04df1a9b
-
SHA1
72e6c398e3a27136a7dee0c85d01b5e37a8926ba
-
SHA256
b9761d12044c02adb84dee1efc641fd721e91ea480c6628b66da0c05b197a38d
-
SHA512
fa7912670b76a08267e63e4fcab5d9d644f5e4fc99a90891fccf4ca0956eef96e738ea742cb37f6efced847f03caf25df11c5f0f6f64628775e8ad3a8196dbb3
-
SSDEEP
3072:16mCoCc+6tLs1w+GgJDppjc9rRk9Fl4Unmat8ZMle1N5EAGBrYhVP:16mCLc7s1w+tqrR6l4Umat8Glef2Aerg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe -
Executes dropped EXE 1 IoCs
pid Process 1592 kfqtnm.exe -
Loads dropped DLL 1 IoCs
pid Process 1592 kfqtnm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
pid pid_target Process procid_target 4496 2132 WerFault.exe 80 1936 2132 WerFault.exe 80 4148 2132 WerFault.exe 80 4724 2132 WerFault.exe 80 2020 2132 WerFault.exe 80 1732 2132 WerFault.exe 80 1948 2132 WerFault.exe 80 1644 2132 WerFault.exe 80 1044 1592 WerFault.exe 108 3944 1592 WerFault.exe 108 4920 1592 WerFault.exe 108 2368 1592 WerFault.exe 108 2204 1592 WerFault.exe 108 1936 1592 WerFault.exe 108 3060 1592 WerFault.exe 108 3524 1592 WerFault.exe 108 4480 1592 WerFault.exe 108 -
Kills process with taskkill 1 IoCs
pid Process 2384 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4692 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1592 kfqtnm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1592 kfqtnm.exe 1592 kfqtnm.exe 1592 kfqtnm.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1592 kfqtnm.exe 1592 kfqtnm.exe 1592 kfqtnm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2520 2132 VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe 99 PID 2132 wrote to memory of 2520 2132 VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe 99 PID 2132 wrote to memory of 2520 2132 VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe 99 PID 2520 wrote to memory of 2384 2520 cmd.exe 103 PID 2520 wrote to memory of 2384 2520 cmd.exe 103 PID 2520 wrote to memory of 2384 2520 cmd.exe 103 PID 2520 wrote to memory of 4692 2520 cmd.exe 105 PID 2520 wrote to memory of 4692 2520 cmd.exe 105 PID 2520 wrote to memory of 4692 2520 cmd.exe 105 PID 2520 wrote to memory of 1592 2520 cmd.exe 108 PID 2520 wrote to memory of 1592 2520 cmd.exe 108 PID 2520 wrote to memory of 1592 2520 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 6842⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 8402⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 9842⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 9802⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 9842⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 9842⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 10602⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2132 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\VirusShare_f4b54fc054606d9cc7cb5cde04df1a9b.exe" & start C:\Users\Admin\AppData\Local\kfqtnm.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 21323⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:4692
-
-
C:\Users\Admin\AppData\Local\kfqtnm.exeC:\Users\Admin\AppData\Local\kfqtnm.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 9484⤵
- Program crash
PID:1044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 9404⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 12404⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 12484⤵
- Program crash
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 12644⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 12964⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 13204⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 13404⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 13484⤵
- Program crash
PID:4480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 1402⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2132 -ip 21321⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2132 -ip 21321⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2132 -ip 21321⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2132 -ip 21321⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2132 -ip 21321⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2132 -ip 21321⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2132 -ip 21321⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2132 -ip 21321⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1592 -ip 15921⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1592 -ip 15921⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1592 -ip 15921⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1592 -ip 15921⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1592 -ip 15921⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1592 -ip 15921⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1592 -ip 15921⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1592 -ip 15921⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1592 -ip 15921⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD5f4b54fc054606d9cc7cb5cde04df1a9b
SHA172e6c398e3a27136a7dee0c85d01b5e37a8926ba
SHA256b9761d12044c02adb84dee1efc641fd721e91ea480c6628b66da0c05b197a38d
SHA512fa7912670b76a08267e63e4fcab5d9d644f5e4fc99a90891fccf4ca0956eef96e738ea742cb37f6efced847f03caf25df11c5f0f6f64628775e8ad3a8196dbb3