Analysis

  • max time kernel
    39s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 10:15

General

  • Target

    25c56f82a69d81dc4ca27696a0408293c9c4900b6b7db4c78c7b58d3efe309ae.exe

  • Size

    808KB

  • MD5

    0e2f759175944928661fbdb2cbef44d0

  • SHA1

    12613621992bf769c332c3a2e2b53277c83c7e08

  • SHA256

    25c56f82a69d81dc4ca27696a0408293c9c4900b6b7db4c78c7b58d3efe309ae

  • SHA512

    9577d48dc45b491c6a21c169766bd4c75dfd91e7d0a8f39c3bd8cb236e4c8169bf62f0ee1561e994a320ccabb6ebe27edb3c40e63a202c3f692ea1afa3c3166d

  • SSDEEP

    24576:XS6Bq2BkBhGp5FRW/Q1WeH9LFImleWYSoaOjA8xvmvsrq:CyBgU5FQ/Q1WOLFbLYJak4krq

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25c56f82a69d81dc4ca27696a0408293c9c4900b6b7db4c78c7b58d3efe309ae.exe
    "C:\Users\Admin\AppData\Local\Temp\25c56f82a69d81dc4ca27696a0408293c9c4900b6b7db4c78c7b58d3efe309ae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\25c56f82a69d81dc4ca27696a0408293c9c4900b6b7db4c78c7b58d3efe309ae.exe
      C:\Users\Admin\AppData\Local\Temp\25c56f82a69d81dc4ca27696a0408293c9c4900b6b7db4c78c7b58d3efe309ae.exe
      2⤵
      • Enumerates VirtualBox registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:1968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1968-54-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-55-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-57-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-60-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-63-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-66-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-69-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-72-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-75-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-78-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-81-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-84-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-87-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1968-90-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB

  • memory/1968-91-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB