Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:42
Behavioral task
behavioral1
Sample
8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe
Resource
win7-20220901-en
General
-
Target
8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe
-
Size
459KB
-
MD5
afdb9995f0e5db969d77c4808f540f13
-
SHA1
74e9a123098ff4fc344fb27b5e1a9103c1cebc3e
-
SHA256
8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71
-
SHA512
135c668ed0e899874b32f1c253e00ad1f6a8811d65eff5547f1221cdff9b8071e249a9197b7107c6d4b4691e0366d80e03209fe0813c61909bb4b8b78f7bceb1
-
SSDEEP
12288:a3aOZZnaNk09pBKhWSzJmNoVqsd5yAi8YWe2dVY:a3aMZnSk09pCWSzvf4Ai8v3dVY
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
Processes:
8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe -
Drops file in Drivers directory 2 IoCs
Processes:
8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe File created C:\Windows\system32\drivers\etc\hosts 8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exepid process 2820 8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe 2820 8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe"C:\Users\Admin\AppData\Local\Temp\8d949b3a294fe15396308f27f1ad287c6e845d45a9180bccfec4f8bc4d569c71.exe"1⤵
- Enumerates VirtualBox registry keys
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
PID:2820