Overview
overview
10Static
static
10virusshare...87.exe
windows10-2004-x64
1virusshare...87.exe
windows11-21h2-x64
1virusshare...4d.exe
windows10-2004-x64
5virusshare...4d.exe
windows11-21h2-x64
5virusshare...c9.xls
windows10-2004-x64
10virusshare...c9.xls
windows11-21h2-x64
10virusshare...f9.doc
windows10-2004-x64
10virusshare...f9.doc
windows11-21h2-x64
10virusshare...30.pdf
windows10-2004-x64
3virusshare...30.pdf
windows11-21h2-x64
3virusshare...re.exe
windows10-2004-x64
1virusshare...re.exe
windows11-21h2-x64
1Analysis
-
max time kernel
101s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2025, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
virusshare/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
virusshare/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
virusshare/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
virusshare/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
virusshare/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
virusshare/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win11-20250411-en
Behavioral task
behavioral7
Sample
virusshare/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
virusshare/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
virusshare/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win10v2004-20250410-en
Behavioral task
behavioral10
Sample
virusshare/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
virusshare/1/malware.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral12
Sample
virusshare/1/malware.exe
Resource
win11-20250410-en
General
-
Target
virusshare/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
-
Size
5.7MB
-
MD5
0a2d1ecedf3f79754aa2c18d62e75287
-
SHA1
4dc6c7ad46c152ee6ebf26488fd5136dd9acfa4f
-
SHA256
e800fce6aadc7792b912abbb693aafe0905a5ab52bc92de9e2a50089de312be9
-
SHA512
00be04178ca0451634ce16e6b5348b768e0bc017dc8b5c6fd9fef1a7110a305b0fa6f240ca486e76f8b13c5e6aae6a416229c63750fb5a98230fd740423fee4f
-
SSDEEP
98304:hemTLkNdfE0pZaN56utgpPFotBER/mQ32lUW:w+156utgpPF8u/7W
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 6136 WINWORD.EXE 6136 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 6136 WINWORD.EXE 6136 WINWORD.EXE 6136 WINWORD.EXE 6136 WINWORD.EXE 6136 WINWORD.EXE 6136 WINWORD.EXE 6136 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\virusshare\1\VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\1\VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe"1⤵PID:3692
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\SaveMount.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:6136
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5800
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270B
MD5e18bde15f5eaccdb66f70859e3ee24f4
SHA115be765d589c2d967aeffb6c79cbd0ee626740af
SHA256f91976ca4a4e38bffe79c1d4baaf9fa478fd6646bc2903306330b8d31e5a740b
SHA512d2154e157af922922cdf9907c909ad5080f36771417bc647f332a4d73774e004160ef2e50f19adcf3b8e72283d28545eabb7976852913df063643d7716d44a9e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84