Analysis
-
max time kernel
190s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe
Resource
win10v2004-20221111-en
General
-
Target
ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe
-
Size
887KB
-
MD5
c6c331ec7babeecdde33f208656fb8cd
-
SHA1
0fd40e99e1d5ca9d884b51e7ba9fac65d49a6d83
-
SHA256
ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31
-
SHA512
e90a6c7b56038b932a21650215e14453f8fc12de8e06f8c8ef93ebd658785935b7824fdebd323cea05f4167e998f5c494774c3ce62d180d82725aa06033819b3
-
SSDEEP
12288:6hfZRfZTdpfAwac8yUkZvELJV6/uv7jF6aHx6eN1lfHJaAis19i:6hfLZTdB4LJV6/4ZHQeT//a
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2308 1092 WerFault.exe 81 2824 1092 WerFault.exe 81 4584 1092 WerFault.exe 81 4436 1092 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeSecurityPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeTakeOwnershipPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeLoadDriverPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeSystemProfilePrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeSystemtimePrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeProfSingleProcessPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeIncBasePriorityPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeCreatePagefilePrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeBackupPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeRestorePrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeShutdownPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeDebugPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeSystemEnvironmentPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeChangeNotifyPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeRemoteShutdownPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeUndockPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeManageVolumePrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeImpersonatePrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: SeCreateGlobalPrivilege 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: 33 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: 34 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: 35 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe Token: 36 1092 ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe"C:\Users\Admin\AppData\Local\Temp\ff70ebfb1d39a7d178d49610c442eee1ddcaf1245a60448e5656e648683f0f31.exe"1⤵
- Enumerates VirtualBox registry keys
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 732162⤵
- Program crash
PID:2308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 733802⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 736962⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 736722⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1092 -ip 10921⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1092 -ip 10921⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1092 -ip 10921⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1092 -ip 10921⤵PID:2032