Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe
Resource
win10v2004-20220812-en
General
-
Target
86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe
-
Size
592KB
-
MD5
7006213947136c5852392c88d50c2e80
-
SHA1
e3b72a4978ba9a5e2a29d91611ae46a1747113ad
-
SHA256
86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0
-
SHA512
20ebb2d34c8e455a1e8f4b44444d9ea5d21050290d26251670f876f63213af87b6ba71c110ca2d1df2515f0c191079472633a8955ddfea88d72fd2f80e5f5858
-
SSDEEP
12288:eejkLZacjai4uQIkQyLRaZ4oR0EztHhDxvpF4ZloOIwz0xDdwJb4:1Oac2iSIkXCR00tBDpS9Iwz0xDdw54
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\M93w7 = "\"C:\\Users\\Admin\\AppData\\Roaming\\M93w7.exe\" opt" 86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1144 86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1144 86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe"C:\Users\Admin\AppData\Local\Temp\86c9074c216c060862615e0aa63d67a83e47c82245de7a881ace4a462eb81cc0.exe"1⤵
- Enumerates VirtualBox registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1144