Overview
overview
10Static
static
10virusshare...87.exe
windows10-2004-x64
1virusshare...4d.exe
windows10-2004-x64
5virusshare...c9.xls
windows10-2004-x64
10virusshare...f9.doc
windows10-2004-x64
10virusshare...30.pdf
windows10-2004-x64
3virusshare...re.exe
windows10-2004-x64
1virusshare...8d.exe
windows10-2004-x64
3virusshare...fa.exe
windows10-2004-x64
3virusshare...c8.doc
windows10-2004-x64
10virusshare...03.doc
windows10-2004-x64
1virusshare...40.pdf
windows10-2004-x64
3virusshare...ng.apk
android-9-x86
virusshare...ng.apk
android-10-x64
virusshare...ng.apk
android-11-x64
virusshare...4e.doc
windows10-2004-x64
1virusshare...cd.pdf
windows10-2004-x64
3virusshare...7b.exe
windows10-2004-x64
10virusshare...82.exe
windows10-2004-x64
3virusshare...6f.doc
windows10-2004-x64
10virusshare...ry.apk
android-9-x86
virusshare...ry.apk
android-10-x64
virusshare...ry.apk
android-11-x64
virusshare...d2.doc
windows10-2004-x64
1virusshare...1d.exe
windows10-2004-x64
Analysis
-
max time kernel
103s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
virusshare/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
virusshare/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
virusshare/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
virusshare/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win10v2004-20250410-en
Behavioral task
behavioral5
Sample
virusshare/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
virusshare/1/malware.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral7
Sample
virusshare/2/VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral8
Sample
virusshare/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral9
Sample
virusshare/2/VirusShare_2fe5b00079aec2d8369a798230313ec8.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
virusshare/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
virusshare/2/VirusShare_480ef02bb062a57724e1b3e14532a140.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
virusshare/2/wedding.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral13
Sample
virusshare/2/wedding.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral14
Sample
virusshare/2/wedding.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral15
Sample
virusshare/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
virusshare/3/VirusShare_4675e87be15585e66b0c88b833dd9ecd.pdf
Resource
win10v2004-20250410-en
Behavioral task
behavioral17
Sample
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral18
Sample
virusshare/3/VirusShare_5c8b670c503455baafbff400a446cf82.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral19
Sample
virusshare/3/VirusShare_6ad036ba93c94d6976e2d93c7a3aec6f.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
virusshare/3/delivery.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral21
Sample
virusshare/3/delivery.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral22
Sample
virusshare/3/delivery.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
virusshare/4/VirusShare_4b8eb7fe75f72c1c5c1f80af9cd165d2.doc
Resource
win10v2004-20250410-en
Behavioral task
behavioral24
Sample
virusshare/4/VirusShare_6d2d7d94fe5faab76b3e786e7d810c1d.exe
Resource
win10v2004-20250314-en
General
-
Target
virusshare/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
-
Size
633KB
-
MD5
0aee78510c46e3a200b6bc21ac1c954d
-
SHA1
aa82dabf571edf16022381f9795376370d4ded7c
-
SHA256
c7d63abc749b1f4e245bd377c11ca5857735491eddab5c176ae99a3b7bf9e0ca
-
SHA512
ff963b0d7f3b90c5d261c101d44c6b8d595cd809ae9e8378fc85d0442d2322a6cc3899a9ec4d2d6e662de32879120a5ba07bb883a20cd2003618aa69f2806117
-
SSDEEP
12288:Px/w9Fmh+HWMxs+KuwetXwuV9W0P5qUKbxqkSnY:PNAckHWCsZulAeRP5VKtqk4Y
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4212-0-0x00000000005D0000-0x0000000000796000-memory.dmp upx behavioral2/memory/4212-8-0x00000000005D0000-0x0000000000796000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe 4212 VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\virusshare\1\VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\1\VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4212