Analysis

  • max time kernel
    185s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 20:31

General

  • Target

    afb5df654b08bfc050f94d85b7ba20c6f391416a260fd671f7aea1642f335be1.exe

  • Size

    1.8MB

  • MD5

    88ff3073407755eee167dc6805fd688f

  • SHA1

    f5b5238538756d1a8e4849342dbc0c4c68bded3a

  • SHA256

    afb5df654b08bfc050f94d85b7ba20c6f391416a260fd671f7aea1642f335be1

  • SHA512

    039ce78f3f1b5fc4810aeb21d86031e7f6f95e6c2a5c357358e394b4065d82377444c1e152c59b278489f2868c3b5d8d620741a86a10e305111134d7d014110b

  • SSDEEP

    49152:ll+9faoX4UnqfzwvrSiihY1u2Q9mTTcY0Hs6RF:lEvpvr/iS1u2CmTGMg

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

Processes

  • C:\Users\Admin\AppData\Local\Temp\afb5df654b08bfc050f94d85b7ba20c6f391416a260fd671f7aea1642f335be1.exe
    "C:\Users\Admin\AppData\Local\Temp\afb5df654b08bfc050f94d85b7ba20c6f391416a260fd671f7aea1642f335be1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    PID:4372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4372-132-0x0000000000C10000-0x0000000000FA6000-memory.dmp

    Filesize

    3.6MB

  • memory/4372-133-0x0000000000C10000-0x0000000000FA6000-memory.dmp

    Filesize

    3.6MB

  • memory/4372-134-0x0000000000C10000-0x0000000000FA6000-memory.dmp

    Filesize

    3.6MB

  • memory/4372-135-0x0000000000C10000-0x0000000000FA6000-memory.dmp

    Filesize

    3.6MB

  • memory/4372-136-0x0000000007410000-0x00000000079B4000-memory.dmp

    Filesize

    5.6MB

  • memory/4372-137-0x0000000006F00000-0x0000000006F92000-memory.dmp

    Filesize

    584KB

  • memory/4372-138-0x0000000006DC0000-0x0000000006DCA000-memory.dmp

    Filesize

    40KB

  • memory/4372-139-0x0000000000C10000-0x0000000000FA6000-memory.dmp

    Filesize

    3.6MB

  • memory/4372-140-0x0000000000C10000-0x0000000000FA6000-memory.dmp

    Filesize

    3.6MB