Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_a30de074dfe04d590e1008bf0e6fc5fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_a30de074dfe04d590e1008bf0e6fc5fc.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_a30de074dfe04d590e1008bf0e6fc5fc.exe
-
Size
940KB
-
MD5
a30de074dfe04d590e1008bf0e6fc5fc
-
SHA1
52c4312c78e378acda7f8250eb7973175c5497aa
-
SHA256
2ef1bd0343a64a212ebcaad2b96a5ba9b4644cffed9feade851f26d7e91544ee
-
SHA512
a4142e8308c345cec98d8490f9d0cefe3d13263838bc3962db4d7ba9b9600e79ebd386d55044cceefbffeea7e7f1f3201eb6e138684436a974042f4f3c8b9298
-
SSDEEP
24576:1nif1ZET/UgPH8yznzTHBiNghUBsLp7ZX:Ji7ET/UGHkNghvBp
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4000-1-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/4000-4-0x0000000000400000-0x00000000005AE000-memory.dmp upx behavioral2/memory/4000-7-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/4000-8-0x0000000000400000-0x00000000005AE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\AS2014 = "C:\\ProgramData\\rx3gg3D3\\rx3gg3D3.exe" VirusShare_a30de074dfe04d590e1008bf0e6fc5fc.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName VirusShare_a30de074dfe04d590e1008bf0e6fc5fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 VirusShare_a30de074dfe04d590e1008bf0e6fc5fc.exe