Analysis

  • max time kernel
    184s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 15:09

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    d24b7c2352792ac7dec29fe995d925b9

  • SHA1

    b17b2d1eaa81540e7e6a5c80ea013e528fa9bbee

  • SHA256

    455bc312a27effdaa26392e7c5470792404cbcd3762ec6227f76c4890bc7d8d7

  • SHA512

    bb5b4267fd6ff3af37c8e44e85fa94703765fecce8feccb89504a8cd41c17c5c15945ffd5bc28ec1d593067e09a67106f2a217c1d8898156717b06dd6bd9aaf0

  • SSDEEP

    49152:wR6eXJYTsIFdk6NkE1VcAkkVBGm/aMyWdn:q6AjIrPB1/nB/j1n

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4084-133-0x0000000000400000-0x000000000078D000-memory.dmp

    Filesize

    3.6MB

  • memory/4084-134-0x0000000077520000-0x00000000776C3000-memory.dmp

    Filesize

    1.6MB

  • memory/4084-135-0x0000000000400000-0x000000000078D000-memory.dmp

    Filesize

    3.6MB

  • memory/4084-136-0x0000000004F60000-0x0000000005504000-memory.dmp

    Filesize

    5.6MB

  • memory/4084-137-0x0000000005550000-0x00000000055E2000-memory.dmp

    Filesize

    584KB

  • memory/4084-138-0x0000000005610000-0x0000000005C28000-memory.dmp

    Filesize

    6.1MB

  • memory/4084-139-0x0000000000400000-0x000000000078D000-memory.dmp

    Filesize

    3.6MB

  • memory/4084-140-0x0000000077520000-0x00000000776C3000-memory.dmp

    Filesize

    1.6MB

  • memory/4084-141-0x0000000005CD0000-0x0000000005DDA000-memory.dmp

    Filesize

    1.0MB

  • memory/4084-142-0x0000000005E00000-0x0000000005E12000-memory.dmp

    Filesize

    72KB

  • memory/4084-143-0x0000000005E20000-0x0000000005E5C000-memory.dmp

    Filesize

    240KB

  • memory/4084-144-0x00000000069C0000-0x0000000006A26000-memory.dmp

    Filesize

    408KB

  • memory/4084-145-0x0000000006D40000-0x0000000006F02000-memory.dmp

    Filesize

    1.8MB

  • memory/4084-146-0x0000000006F10000-0x000000000743C000-memory.dmp

    Filesize

    5.2MB

  • memory/4084-147-0x0000000000400000-0x000000000078D000-memory.dmp

    Filesize

    3.6MB

  • memory/4084-148-0x0000000077520000-0x00000000776C3000-memory.dmp

    Filesize

    1.6MB