Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    22-06-2022 11:33

General

  • Target

    2e3fac6fde0e4ea23a1ac808dc11986f62be096971759a36e64b846feb9ddaf9.exe

  • Size

    703KB

  • MD5

    2f3376d35213ff2bab75eebc1d03f860

  • SHA1

    b1d944b95f078a80ce37573fe48faf4465d49b2d

  • SHA256

    2e3fac6fde0e4ea23a1ac808dc11986f62be096971759a36e64b846feb9ddaf9

  • SHA512

    c6f335fba1d32a6192a31e75af0c64a405732394cc1810e796520906202c2f8907653dc4744206505484e119a553e400cc5f718f5f74e64693192f78f498872a

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e3fac6fde0e4ea23a1ac808dc11986f62be096971759a36e64b846feb9ddaf9.exe
    "C:\Users\Admin\AppData\Local\Temp\2e3fac6fde0e4ea23a1ac808dc11986f62be096971759a36e64b846feb9ddaf9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Looks for VMWare Tools registry key
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 580
      2⤵
      • Program crash
      PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1280-54-0x0000000076181000-0x0000000076183000-memory.dmp

    Filesize

    8KB