Analysis

  • max time kernel
    148s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 02:17

General

  • Target

    376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe

  • Size

    515KB

  • MD5

    618db77e6151eb5693844bbaf925c852

  • SHA1

    011057517dce8608823ef2177c84cadc879ba6ba

  • SHA256

    376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d

  • SHA512

    b2ca095ea3d4d24ccc1f9e7fc638026fbd9d2f11e9ea39f00f6d6a26c5acc72967bd7b3eaca6ca6516969790f238c0b839ba37166d382cc6a8ae2f2761a752b4

  • SSDEEP

    12288:fdxYtVrDwXMNQB0O1zBnc3qp4t1Ntt9Ls/4SVjyO:fru8XTmOFp4bhlsbyO

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe
    "C:\Users\Admin\AppData\Local\Temp\376c0e2f040759400c40f0a1d86d3d8bbb8a14f545ce38ec7b15153be68f6c5d.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    PID:1444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1444-54-0x00000000003E0000-0x00000000003F1000-memory.dmp

    Filesize

    68KB

  • memory/1444-55-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1444-56-0x0000000075D71000-0x0000000075D73000-memory.dmp

    Filesize

    8KB

  • memory/1444-58-0x00000000003E0000-0x00000000003E3000-memory.dmp

    Filesize

    12KB

  • memory/1444-57-0x00000000003E0000-0x00000000003F1000-memory.dmp

    Filesize

    68KB

  • memory/1444-59-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1444-61-0x00000000003E0000-0x00000000003E3000-memory.dmp

    Filesize

    12KB

  • memory/1444-60-0x00000000003E0000-0x00000000003F1000-memory.dmp

    Filesize

    68KB

  • memory/1444-62-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB