Analysis

  • max time kernel
    155s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 11:19

General

  • Target

    6621457478b4753e51231f346a867d701f5b3b7687cbd52c95756616855e2294.exe

  • Size

    903KB

  • MD5

    c7b392ec2cc071dd681f4557237635c1

  • SHA1

    6349c3b9520fbdfd819c5f8ab92872a48af30326

  • SHA256

    6621457478b4753e51231f346a867d701f5b3b7687cbd52c95756616855e2294

  • SHA512

    2aa847d39755d6288591c7732a17bf35302317aa26d63242073a098f9fdb10d275206d72d8cfa8ce071c9beb527b6ddd4c2ff86751d74468b4d412ffd693dae7

  • SSDEEP

    12288:yyDjlA0FyP9s9GSN5MhRIi1Gll4Y+dnuvlhnDbV:yOVFyFhSH0Jduv7nPV

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6621457478b4753e51231f346a867d701f5b3b7687cbd52c95756616855e2294.exe
    "C:\Users\Admin\AppData\Local\Temp\6621457478b4753e51231f346a867d701f5b3b7687cbd52c95756616855e2294.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:4908

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4908-132-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-133-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-134-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-135-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-137-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-138-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-139-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-140-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-141-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-142-0x0000000002280000-0x00000000022FB000-memory.dmp

          Filesize

          492KB

        • memory/4908-143-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-144-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB

        • memory/4908-145-0x0000000000400000-0x00000000004E5000-memory.dmp

          Filesize

          916KB