Analysis

  • max time kernel
    25s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 17:05

General

  • Target

    fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe

  • Size

    679KB

  • MD5

    c3a9b2e9ea97c67215165eecb1c17fa6

  • SHA1

    982f039c810be5ff5369f4d867e68ebd24344d43

  • SHA256

    fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a

  • SHA512

    e9409c71663a55a839969a33a3b2ccb2f8b90af9c46e75ab7e2fab816ff1ec812600910c857874b5dfaf10ed2e2a75b68e243d90976c5d5120a0ac43f032fb5f

  • SSDEEP

    12288:6Tm6uX/oPA+TleOLqLd4yjA6/7/9olHK8sWLoRVt5HmxOS:6duX/x+ReiqLdO4/9ol1sWsRVvHmAS

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe
    "C:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe
      C:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe
      2⤵
      • Enumerates VirtualBox registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-54-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-55-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-57-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-60-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-63-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-66-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-69-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-72-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-75-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-78-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-81-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-84-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-87-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2040-90-0x0000000076381000-0x0000000076383000-memory.dmp

    Filesize

    8KB

  • memory/2040-91-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB