Analysis

  • max time kernel
    146s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 13:35

General

  • Target

    def69e2e38a0d07784b5be70c6b1f408628df5ddefa8493b768099af12d6402f.exe

  • Size

    665KB

  • MD5

    a2bdebbdef400acbab8dc5e6008e44bc

  • SHA1

    17ef2e9f2bff845cb5febf592f4ff4a089953d56

  • SHA256

    def69e2e38a0d07784b5be70c6b1f408628df5ddefa8493b768099af12d6402f

  • SHA512

    b529bf631632e09f018b66c05ada9aef928b850a46c1a9bb1b9f4bacd658dc180652d7e100e4d3c4ec605f6162a1c97c58c430da28a54e597cd009c1a0bf0a53

  • SSDEEP

    12288:cTthTBbSeQaOtCqpOEeaE76iFFT4HfbJbLckW2VwiuN3QQc2rU5s/FV:ytFBbSe+tlpY76ET4/bJbgklwiogDHQ

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\def69e2e38a0d07784b5be70c6b1f408628df5ddefa8493b768099af12d6402f.exe
    "C:\Users\Admin\AppData\Local\Temp\def69e2e38a0d07784b5be70c6b1f408628df5ddefa8493b768099af12d6402f.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:1404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1404-54-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB