Analysis
-
max time kernel
325s -
max time network
403s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe
Resource
win10v2004-20221111-en
General
-
Target
fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe
-
Size
512KB
-
MD5
40520d40fe834f371a00ffa5b8c5ce14
-
SHA1
becb0cf7ee5f3418c43eca2bea9fc71a215bd9ba
-
SHA256
fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e
-
SHA512
3abcbd3b78812b3955ecd8fa855c1a12194964aa253f324bbfa8f41721cd2827777607ebc64be3fcf48f4ecc81d2dde655bf80de6af6efce373c5f4de543fcf9
-
SSDEEP
12288:0+h9St2Ma70zIIc91Dwws4zruXic2O/3E4q:0+h9OY70z+warul3E4q
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3672 fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe 3672 fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe"C:\Users\Admin\AppData\Local\Temp\fe13949ebc407ac69c133bdb712a493f29dd6ffdac40a8e7c2b5544ffba1450e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3672