Analysis

  • max time kernel
    154s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 15:43

General

  • Target

    ed776dca9647532964a09cb10867624bd13e0981e592f65d5a3c5e0e2ed63c6c.exe

  • Size

    1.3MB

  • MD5

    05346ee80d041822a94e82cecf495d02

  • SHA1

    eed7314ac09767dde281249fd4568a7a10c7e3ee

  • SHA256

    ed776dca9647532964a09cb10867624bd13e0981e592f65d5a3c5e0e2ed63c6c

  • SHA512

    c8e60f3fe18ecd6e3a4d5b0f3ac3ff8908ba3c06d6d0ab2e9da0e878ca4b8c8fee1ffc667712f6916f9e40f2d514ab5bd291eac359c3ada4d79693079488927b

  • SSDEEP

    24576:xbwzN9leQIpYpohcAznlT8jIdNqn/V+pj4E4a9/nnFII+yDFmq3QOwc/s5rn:aBLeQIpYpmc4nx8jMq9k4/W/nn1+yR3I

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed776dca9647532964a09cb10867624bd13e0981e592f65d5a3c5e0e2ed63c6c.exe
    "C:\Users\Admin\AppData\Local\Temp\ed776dca9647532964a09cb10867624bd13e0981e592f65d5a3c5e0e2ed63c6c.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4964-132-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-133-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-134-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-136-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-137-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-138-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-139-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-140-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/4964-141-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB