Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe
Resource
win10v2004-20220812-en
General
-
Target
376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe
-
Size
515KB
-
MD5
618db77e6151eb5693844bbaf925c852
-
SHA1
011057517dce8608823ef2177c84cadc879ba6ba
-
SHA256
376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d
-
SHA512
b2ca095ea3d4d24ccc1f9e7fc638026fbd9d2f11e9ea39f00f6d6a26c5acc72967bd7b3eaca6ca6516969790f238c0b839ba37166d382cc6a8ae2f2761a752b4
-
SSDEEP
12288:fdxYtVrDwXMNQB0O1zBnc3qp4t1Ntt9Ls/4SVjyO:fru8XTmOFp4bhlsbyO
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qG7i3q7 = "\"C:\\Users\\Admin\\AppData\\Roaming\\qG7i3q7.exe\" opt" 376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1444 376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1444 376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe"C:\Users\Admin\AppData\Local\Temp\376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe"1⤵
- Enumerates VirtualBox registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1444