Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe
-
Size
144KB
-
MD5
71efd5f8d2ad4c891d4d52f2cce17561
-
SHA1
f34013094d0de6756de5c4979181e1a468836454
-
SHA256
62c10c55dac6618eff4716e89de4bae41c429102fae8cae2f0ffc86a05ad82e2
-
SHA512
0f8bab954b18c6e57a3bd0b1b685a5c4d4b194ab30c4b0e8a192cf57d9343c33e7b3f2ed9cb8a815f931b702c528d01ac58f30b8bfa3921854b285cd899bd7b0
-
SSDEEP
3072:XNfr+k4XY4h+PhzjzrOdt9lES2jbxWGqe:XNf14D+PhznrOdmSbGqe
Malware Config
Extracted
tofsee
91.218.39.211
188.130.237.44
91.204.162.103
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe -
Executes dropped EXE 1 IoCs
Processes:
obgtylem.exepid process 3580 obgtylem.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\obgtylem.exe\"" VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
obgtylem.exedescription pid process target process PID 3580 set thread context of 5004 3580 obgtylem.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2964 5004 WerFault.exe svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exeobgtylem.exedescription pid process target process PID 4440 wrote to memory of 3580 4440 VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe obgtylem.exe PID 4440 wrote to memory of 3580 4440 VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe obgtylem.exe PID 4440 wrote to memory of 3580 4440 VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe obgtylem.exe PID 3580 wrote to memory of 5004 3580 obgtylem.exe svchost.exe PID 3580 wrote to memory of 5004 3580 obgtylem.exe svchost.exe PID 3580 wrote to memory of 5004 3580 obgtylem.exe svchost.exe PID 3580 wrote to memory of 5004 3580 obgtylem.exe svchost.exe PID 3580 wrote to memory of 5004 3580 obgtylem.exe svchost.exe PID 4440 wrote to memory of 1528 4440 VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe cmd.exe PID 4440 wrote to memory of 1528 4440 VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe cmd.exe PID 4440 wrote to memory of 1528 4440 VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\obgtylem.exe"C:\Users\Admin\obgtylem.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 3564⤵
- Program crash
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3144.bat" "2⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5004 -ip 50041⤵PID:3340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD5a54d95aaffc8e6ad3c02c8ba1bab1655
SHA1a1e2225c660ac94e9af43bf7636fc9fce7388ec0
SHA25623e43064f4cdf6de171ba53bdcbdaedcae860970931d1374fe55369ae80bbab6
SHA512a03918618148690d0526e47366de0f9a11e748bc1e2eb332899c9ef49fe1ee802ac9f60d25b85bf107b7e1448fb473cfa06e809aeb957ac09199f206eff546bc
-
Filesize
37.0MB
MD5476661bcd6b81ac401d2033411d0fdce
SHA18ae3eed4269fc42a1ab2d26ea68f772d90a4524a
SHA256a7f19de76f2d8ac16b093a887e6defe98c7bd65f4b1ac672e60e17a3a3ecc5eb
SHA5123c7fe15f197ff08aaad4711738bf413002a195aa8aeb66c4fa4b8eddae463e8d0062544274dbd7e03adb86857ccefee3b2ff6010287562cc5f4fa5ddec71ba28