Resubmissions
13-01-2025 06:07
250113-gvkebasjeq 713-01-2025 06:00
250113-gqadjs1qhr 713-01-2025 05:49
250113-gh1krs1ndr 713-01-2025 05:36
250113-galfwa1kdl 7Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 06:00
Static task
static1
Behavioral task
behavioral1
Sample
VirusSample2.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VirusSample2.rar
Resource
win10v2004-20241007-en
General
-
Target
VirusSample2.rar
-
Size
21.1MB
-
MD5
e4e8f137fcd5d8c8be5d87228a1e83ac
-
SHA1
a6ad110c747a40def97b5a4eb29fb35e4c299be7
-
SHA256
a0d69f37d3ba0dc95cb0f3eaa9975a1ff418890a68c6393b3a9d2e7634d1b00b
-
SHA512
20fff490f2e73457a06cf39cca57880741aab3714721d0a896770b0ee33b1a078f7eb209eed5cde019538f0ccfa3bd12f6ee6d76d7571346c76bc2d6bc545713
-
SSDEEP
393216:7Ma43eiU82dY4aPvkTCwie/akRForX96btuJxcZ7SYAnumlc:4aqeTNaPvkweD/8AtuCZ7SXucc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3140 S0FTWARE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3140 set thread context of 2220 3140 S0FTWARE.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2688 7zFM.exe Token: 35 2688 7zFM.exe Token: SeSecurityPrivilege 2688 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2688 7zFM.exe 2688 7zFM.exe 2688 7zFM.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104 PID 3140 wrote to memory of 2220 3140 S0FTWARE.exe 104
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\VirusSample2.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2688
-
C:\Users\Admin\Desktop\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55e54cb9759d1a9416f51ac1e759bbccf
SHA11a033a7aae7c294967b1baba0b1e6673d4eeefc6
SHA256f7e5cae32e2ec2c35346954bfb0b7352f9a697c08586e52494a71ef00e40d948
SHA51232dcca4432ec0d2a8ad35fe555f201fef828b2f467a2b95417b42ff5b5149aee39d626d244bc295dca8a00cd81ef33a20f9e681dd47eb6ee47932d5d8dd2c664
-
Filesize
10.5MB
MD5107f2ad17a30b5d498a0bde5f6b76147
SHA1ca206ceb5253b83bb009d87ea0d6b4265cabd768
SHA25682819ee0b35a59f56f57b91fc9f9b53a6086e6d35df65ba854f874580bc63639
SHA512146eaa30a2b8070f5ea76a3a5657ff35390dd2ff38f593712b749aa84fa9fb4512cb2be8cf4aea8422c00db65074a17feb27e1e98d5db84f1fde80fc92a1f3ad