Analysis
-
max time kernel
153s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 03:35
Static task
static1
Behavioral task
behavioral1
Sample
3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe
Resource
win10v2004-20220414-en
General
-
Target
3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe
-
Size
184KB
-
MD5
74dc37b7aabf745eac1d5fc65428488e
-
SHA1
fa406e4e4fe581091e30bac24ad0a1023bc5eed3
-
SHA256
3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b
-
SHA512
660d9ed08afa90dc782d3814ab8428137d5748c63433b3fb3ddc76da9412a279d1da2fd87e1a11dbedd486edbdabd5db871d4912704e49b9ccb3ac3c39e4ac21
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exedescription pid process Token: SeDebugPrivilege 1676 3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe"C:\Users\Admin\AppData\Local\Temp\3d4bca06160a1916b52e9bbdc376faa138efb026f838583f62a4851675cb5d6b.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1676