Analysis
-
max time kernel
150s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe
Resource
win10v2004-20221111-en
General
-
Target
fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe
-
Size
720KB
-
MD5
b8b3d8f33fc2f7fd91d51374ea70c740
-
SHA1
ca920fb505614c0aee2b2bc793ad952d4372db9a
-
SHA256
fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c
-
SHA512
f566e1cb14cee21dda8fa2ed08e305d7971023b7a2682168c45b3cc95c0282bb6e4790c40c8d515eb869e747ba3e3566db377825b2b94d5587575a91d7a85ac7
-
SSDEEP
12288:CviiRYG8wKRQu2Fww8thNu9SWNMN/JWLs2Ez31DIoAXycpJGfl:C6iOvRQRp8V2S0MbWo24lkoSw
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
Processes:
fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exepid process 820 fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe 820 fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exedescription pid process Token: SeDebugPrivilege 820 fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe Token: SeCreateGlobalPrivilege 820 fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe"C:\Users\Admin\AppData\Local\Temp\fef6f7a829f489a3daf369747505fcd7fd5b097a20c69d50290cd476f3bb2f1c.exe"1⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820