Analysis
-
max time kernel
25s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe
Resource
win10v2004-20220901-en
General
-
Target
fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe
-
Size
679KB
-
MD5
c3a9b2e9ea97c67215165eecb1c17fa6
-
SHA1
982f039c810be5ff5369f4d867e68ebd24344d43
-
SHA256
fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a
-
SHA512
e9409c71663a55a839969a33a3b2ccb2f8b90af9c46e75ab7e2fab816ff1ec812600910c857874b5dfaf10ed2e2a75b68e243d90976c5d5120a0ac43f032fb5f
-
SSDEEP
12288:6Tm6uX/oPA+TleOLqLd4yjA6/7/9olHK8sWLoRVt5HmxOS:6duX/x+ReiqLdO4/9ol1sWsRVvHmAS
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1252 set thread context of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28 PID 1252 wrote to memory of 2040 1252 fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe"C:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exeC:\Users\Admin\AppData\Local\Temp\fe31b2ce25191e8c00f9e8a96dd6553c66583ecdfa1e4a7571f30f24ff505f0a.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:2040
-