Analysis

  • max time kernel
    133s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 03:53

General

  • Target

    6cea15020bdfb7210c77be75653d76137fafa09ea2fcdf2d3006dae0cbe0ab8a.exe

  • Size

    767KB

  • MD5

    7709f2775d31f68ee5efa479a1afaa28

  • SHA1

    51c555a2763a8760a0b473080cf2e582b6117088

  • SHA256

    6cea15020bdfb7210c77be75653d76137fafa09ea2fcdf2d3006dae0cbe0ab8a

  • SHA512

    80e929e6eba0bac0a76a5aa64687fd23c6c52fe70a1b92e98761607d599bafe26fabe6bd399ee34ab4325641671ec506b278b7648a802d266a8647cf49a0ddab

  • SSDEEP

    12288:VryS2KmxOEaIDGwU+xxfFMc0TQYyxuuHuii9XG2lm9J9ARssvYsbEOAEZ1XGwXNn:NoKmAIDGH+mJ8Yyx7KX/sJKqCYGhDwE

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cea15020bdfb7210c77be75653d76137fafa09ea2fcdf2d3006dae0cbe0ab8a.exe
    "C:\Users\Admin\AppData\Local\Temp\6cea15020bdfb7210c77be75653d76137fafa09ea2fcdf2d3006dae0cbe0ab8a.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    PID:4976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4976-132-0x0000000002DE0000-0x0000000002DEA000-memory.dmp

    Filesize

    40KB

  • memory/4976-133-0x0000000002DE0000-0x0000000002DEA000-memory.dmp

    Filesize

    40KB

  • memory/4976-134-0x0000000002DE0000-0x0000000002DE2000-memory.dmp

    Filesize

    8KB

  • memory/4976-135-0x0000000000E10000-0x0000000000ED2000-memory.dmp

    Filesize

    776KB

  • memory/4976-136-0x0000000000E10000-0x0000000000ED2000-memory.dmp

    Filesize

    776KB