Resubmissions

13-01-2025 06:07

250113-gvkebasjeq 7

13-01-2025 06:00

250113-gqadjs1qhr 7

13-01-2025 05:49

250113-gh1krs1ndr 7

13-01-2025 05:36

250113-galfwa1kdl 7

Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 06:00

General

  • Target

    VirusSample2.rar

  • Size

    21.1MB

  • MD5

    e4e8f137fcd5d8c8be5d87228a1e83ac

  • SHA1

    a6ad110c747a40def97b5a4eb29fb35e4c299be7

  • SHA256

    a0d69f37d3ba0dc95cb0f3eaa9975a1ff418890a68c6393b3a9d2e7634d1b00b

  • SHA512

    20fff490f2e73457a06cf39cca57880741aab3714721d0a896770b0ee33b1a078f7eb209eed5cde019538f0ccfa3bd12f6ee6d76d7571346c76bc2d6bc545713

  • SSDEEP

    393216:7Ma43eiU82dY4aPvkTCwie/akRForX96btuJxcZ7SYAnumlc:4aqeTNaPvkweD/8AtuCZ7SXucc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\VirusSample2.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2688
  • C:\Users\Admin\Desktop\S0FTWARE.exe
    "C:\Users\Admin\Desktop\S0FTWARE.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zE08A87D87\KeyFile\1049\sharedmanagementobjects_keyfile.dll

    Filesize

    23KB

    MD5

    5e54cb9759d1a9416f51ac1e759bbccf

    SHA1

    1a033a7aae7c294967b1baba0b1e6673d4eeefc6

    SHA256

    f7e5cae32e2ec2c35346954bfb0b7352f9a697c08586e52494a71ef00e40d948

    SHA512

    32dcca4432ec0d2a8ad35fe555f201fef828b2f467a2b95417b42ff5b5149aee39d626d244bc295dca8a00cd81ef33a20f9e681dd47eb6ee47932d5d8dd2c664

  • C:\Users\Admin\Desktop\S0FTWARE.exe

    Filesize

    10.5MB

    MD5

    107f2ad17a30b5d498a0bde5f6b76147

    SHA1

    ca206ceb5253b83bb009d87ea0d6b4265cabd768

    SHA256

    82819ee0b35a59f56f57b91fc9f9b53a6086e6d35df65ba854f874580bc63639

    SHA512

    146eaa30a2b8070f5ea76a3a5657ff35390dd2ff38f593712b749aa84fa9fb4512cb2be8cf4aea8422c00db65074a17feb27e1e98d5db84f1fde80fc92a1f3ad

  • memory/2220-334-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2220-335-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2220-336-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2220-343-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB