Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe
Resource
win10v2004-20220812-en
General
-
Target
40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe
-
Size
687KB
-
MD5
544e33c71e69c5610572c31970819400
-
SHA1
c85501e6ae7f4f13c69cbe06d180fce1f40cc886
-
SHA256
40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8
-
SHA512
54737631f9d11e3bef1ca83abdd559aad11f99121553adca73be9dc0470c5e4e48663083000bf79866a2a8439ca9acf0c821657590e1f4eaf67ac674723b0ef2
-
SSDEEP
12288:0DIxsNvzUtyOM0JcdsfAsRT9ZSXGAmRR5DUrqfrTrpinH788bsxOPo9ho:EIxsNL4W4XoQimBD2qH+HiYOho
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeSecurityPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeTakeOwnershipPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeLoadDriverPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeSystemProfilePrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeSystemtimePrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeProfSingleProcessPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeIncBasePriorityPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeCreatePagefilePrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeBackupPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeRestorePrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeShutdownPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeDebugPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeSystemEnvironmentPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeChangeNotifyPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeRemoteShutdownPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeUndockPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeManageVolumePrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeImpersonatePrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: SeCreateGlobalPrivilege 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: 33 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: 34 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe Token: 35 240 40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe"C:\Users\Admin\AppData\Local\Temp\40dd8eaafcf65137d7f66f7153335a9a01df868c6891b5d8ab5a4f23ec759cc8.exe"1⤵
- Enumerates VirtualBox registry keys
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240