Analysis

  • max time kernel
    30s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 03:29

General

  • Target

    d0f0cc9987c381ea6e84dc9d32e082a1615381cf598b2d1395ccf27e60c4db42.exe

  • Size

    800KB

  • MD5

    ad3b6bd6123c2dd2d90bff326929e8cd

  • SHA1

    a6b832de9ab1df9cd13dc66151a50362d3f013ad

  • SHA256

    d0f0cc9987c381ea6e84dc9d32e082a1615381cf598b2d1395ccf27e60c4db42

  • SHA512

    a8e8035d7fc4c50f634545ff676ec25ceedd6ce7e9eb119cdd8de05f5b150520d5ff279cedaa5961e763ca325dd8707e6fd9167642d93ed246c93f0a35b13848

  • SSDEEP

    12288:4KcQ6ahMhqqZv2JW3rVnb9M62ZuX8hdVEEh3zDsBj3sw:8a3KZSZuXwhDDspsw

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0f0cc9987c381ea6e84dc9d32e082a1615381cf598b2d1395ccf27e60c4db42.exe
    "C:\Users\Admin\AppData\Local\Temp\d0f0cc9987c381ea6e84dc9d32e082a1615381cf598b2d1395ccf27e60c4db42.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1324-54-0x0000000000240000-0x0000000000255000-memory.dmp

    Filesize

    84KB

  • memory/1324-55-0x0000000000400000-0x0000000000528000-memory.dmp

    Filesize

    1.2MB

  • memory/1324-56-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB

  • memory/1324-57-0x0000000000240000-0x0000000000255000-memory.dmp

    Filesize

    84KB

  • memory/1324-58-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1324-59-0x0000000000400000-0x0000000000528000-memory.dmp

    Filesize

    1.2MB

  • memory/1324-60-0x0000000000240000-0x0000000000255000-memory.dmp

    Filesize

    84KB

  • memory/1324-61-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1324-62-0x0000000000400000-0x0000000000528000-memory.dmp

    Filesize

    1.2MB