Analysis

  • max time kernel
    197s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 03:40

General

  • Target

    70a45ce6dddc901026f01a3e48d3a096a860c2cec0a2de088348ea7ab7441edb.exe

  • Size

    647KB

  • MD5

    4e6d96a691ab686c6e89ead26ec66cb4

  • SHA1

    db369c8e98c5f5ab81405fb1096c1e66781e71c6

  • SHA256

    70a45ce6dddc901026f01a3e48d3a096a860c2cec0a2de088348ea7ab7441edb

  • SHA512

    a85cf7e6f0f39d397f88e2753b8a040e7aa7fac1d95778c3dbd33f7af79caf689d96c96dd75981b3a5906df25728700217730e16fa3d9bc9badcc323d1d92fe6

  • SSDEEP

    12288:bwtZv5CggrTuk4p1SGPteP1zvFvubdkUwOQ+Uxim2Zi1ZB:EtLfg2LNlazmjweUxj2Cn

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70a45ce6dddc901026f01a3e48d3a096a860c2cec0a2de088348ea7ab7441edb.exe
    "C:\Users\Admin\AppData\Local\Temp\70a45ce6dddc901026f01a3e48d3a096a860c2cec0a2de088348ea7ab7441edb.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:4656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 608
      2⤵
      • Program crash
      PID:1496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4656 -ip 4656
    1⤵
      PID:400

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4656-132-0x0000000000560000-0x000000000056C000-memory.dmp

      Filesize

      48KB

    • memory/4656-133-0x00000000024D0000-0x00000000025D5000-memory.dmp

      Filesize

      1.0MB

    • memory/4656-134-0x00000000024D0000-0x00000000025D5000-memory.dmp

      Filesize

      1.0MB

    • memory/4656-135-0x0000000002200000-0x0000000002305000-memory.dmp

      Filesize

      1.0MB

    • memory/4656-136-0x0000000000560000-0x000000000056C000-memory.dmp

      Filesize

      48KB

    • memory/4656-137-0x0000000000560000-0x0000000000563000-memory.dmp

      Filesize

      12KB

    • memory/4656-138-0x00000000024D0000-0x000000000258F000-memory.dmp

      Filesize

      764KB

    • memory/4656-139-0x00000000024D0000-0x00000000025D5000-memory.dmp

      Filesize

      1.0MB