Analysis
-
max time kernel
197s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:08
Static task
static1
Behavioral task
behavioral1
Sample
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe
Resource
win10v2004-20221111-en
General
-
Target
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe
-
Size
422KB
-
MD5
598aca1d2f65bceb1ef9f31ad2ab96fe
-
SHA1
fbbeaebab493d82f820e50207fb0a267e9c04a8e
-
SHA256
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8
-
SHA512
83cf96f9867f905f4e6e0522f29e8ed07923c71bef87cf760a92dbc588ef4fa62135f455acc0933bdf6a8a0fd482b7a0086cd9c0d24e5fad5e96bdb5539388af
-
SSDEEP
6144:wOB3BjusqfPPuL0aEMcTOFunAQj83SRUkaBYgV2kxEYbzVMPkJY7R3rAzqB6BP01:wOBoGL0asOfT2kxE6mwWR3k2IjW
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
Processes:
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\9q1793 = "\"C:\\Users\\Admin\\AppData\\Roaming\\9q1793.exe\" opt" abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exepid process 3824 abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe 3824 abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exepid process 3824 abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe"C:\Users\Admin\AppData\Local\Temp\abe9e6d83b7b1f99a7ae1435143e2fd05c3c3abde2c56059078f229cf44769d8.exe"1⤵
- Enumerates VirtualBox registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3824