Analysis
-
max time kernel
149s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 08:35
Behavioral task
behavioral1
Sample
a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe
Resource
win7-20220812-en
General
-
Target
a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe
-
Size
439KB
-
MD5
1c818126a6952db45e20d85c295ba349
-
SHA1
b2ae1a23c375c9224b01b1e445e5fa3f64fe9e28
-
SHA256
a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27
-
SHA512
4ba3e31d17cc2c83e62a68e1e0ab52f0efd0cfad4534219c88ca838c0dd105e5cc279944e1b03485c32c331512076d8e6324396fd2387115a09fa339a1f8ba36
-
SSDEEP
6144:xl6Zrx1AbqdxJWN91Sg8XgTcEXNUyEZ4nEIlfRXrkL2FaWG1UyUZeUvLmLxWQpo7:xJcxGjFAEdUb+hfpaWHbg+aLxHpo7
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
Processes:
a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe -
Drops file in Drivers directory 2 IoCs
Processes:
a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe File created C:\Windows\system32\drivers\etc\hosts a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exepid process 896 a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe"C:\Users\Admin\AppData\Local\Temp\a9d4b533c0680fd076c21ef8b4569a6314fe3ec71e6eb91c09f24a3ff4e67b27.exe"1⤵
- Enumerates VirtualBox registry keys
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/896-54-0x0000000000120000-0x000000000012F000-memory.dmpFilesize
60KB
-
memory/896-55-0x0000000076411000-0x0000000076413000-memory.dmpFilesize
8KB
-
memory/896-56-0x0000000000980000-0x0000000000A36000-memory.dmpFilesize
728KB
-
memory/896-57-0x0000000000120000-0x000000000012F000-memory.dmpFilesize
60KB
-
memory/896-59-0x0000000000120000-0x0000000000122000-memory.dmpFilesize
8KB
-
memory/896-58-0x0000000000120000-0x000000000012F000-memory.dmpFilesize
60KB