Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 07:15

General

  • Target

    af7bf12535c2d7dcd1a197c0142750424e5a41a8e1e24f17df989c6785170ba8.exe

  • Size

    675KB

  • MD5

    fa8fb0f4cc4034cf4990c9acdc86b59e

  • SHA1

    56f68e1ef0e36d4c3ee00ce690030431bf3e69f1

  • SHA256

    af7bf12535c2d7dcd1a197c0142750424e5a41a8e1e24f17df989c6785170ba8

  • SHA512

    19e9929952273fbbd6d2c17d6e768872448dae5a64391bdbbca49132ecbd55af9f9b92612706725ac6a34a5eeb5d4e753887ea62db419fbcbb0bf3f0361640a1

  • SSDEEP

    12288:JCEzBOzcbPoVTZp7EWgh0uDbv/o0lQVfG+IPe4gctUkJiV8Bbm:JCzOWTZpb20uD7DYfn415iK

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af7bf12535c2d7dcd1a197c0142750424e5a41a8e1e24f17df989c6785170ba8.exe
    "C:\Users\Admin\AppData\Local\Temp\af7bf12535c2d7dcd1a197c0142750424e5a41a8e1e24f17df989c6785170ba8.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:2228
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
      PID:4768

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2228-132-0x0000000000400000-0x00000000004AB000-memory.dmp
      Filesize

      684KB

    • memory/2228-133-0x0000000000400000-0x00000000004AB000-memory.dmp
      Filesize

      684KB

    • memory/2228-134-0x0000000002210000-0x00000000022BB000-memory.dmp
      Filesize

      684KB

    • memory/2228-135-0x0000000000400000-0x00000000004AB000-memory.dmp
      Filesize

      684KB

    • memory/2228-136-0x0000000000400000-0x00000000004AB000-memory.dmp
      Filesize

      684KB

    • memory/2228-137-0x0000000000400000-0x00000000004AB000-memory.dmp
      Filesize

      684KB