Analysis

  • max time kernel
    34s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 14:59

General

  • Target

    c920adebbb3f672ca472940ef8f9bf7b9e5f331dfb71854402ef0de5c97fc749.exe

  • Size

    1.1MB

  • MD5

    6b595a38a61abfa4fdb40c2726b54583

  • SHA1

    623ac4bf529a42b3d2c007c10a34438cc7c24887

  • SHA256

    c920adebbb3f672ca472940ef8f9bf7b9e5f331dfb71854402ef0de5c97fc749

  • SHA512

    36ee26547ce57675d3a9d9e8dd9f0e9c4a11b9c676e5e2bb2a40db22bac14cfceb423db9fe7d2db9c6239a99faa265b201659c8ac24b481efd010ca215ac73f2

  • SSDEEP

    12288:e0nwuWGyqJEjVAFR9QCIAAKK2GhouKx2RnglGAEqnjFGRueuFAB6hSFCG+5NNpDi:Fm8QCIN/LKxcIEDRueMEox9pDQKC

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c920adebbb3f672ca472940ef8f9bf7b9e5f331dfb71854402ef0de5c97fc749.exe
    "C:\Users\Admin\AppData\Local\Temp\c920adebbb3f672ca472940ef8f9bf7b9e5f331dfb71854402ef0de5c97fc749.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-54-0x0000000075E51000-0x0000000075E53000-memory.dmp

    Filesize

    8KB

  • memory/1644-55-0x0000000001D90000-0x0000000001E86000-memory.dmp

    Filesize

    984KB

  • memory/1644-56-0x0000000001D90000-0x0000000001E86000-memory.dmp

    Filesize

    984KB

  • memory/1644-57-0x0000000001D90000-0x0000000001D95000-memory.dmp

    Filesize

    20KB

  • memory/1644-58-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1644-59-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1644-61-0x0000000001D90000-0x0000000001D95000-memory.dmp

    Filesize

    20KB

  • memory/1644-60-0x0000000001D90000-0x0000000001E86000-memory.dmp

    Filesize

    984KB

  • memory/1644-62-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB