Analysis

  • max time kernel
    37s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 07:54

General

  • Target

    a8a3d5c67349345d5a6f0906cb9da7bf7f8397392717377d14da2785e2559a37.exe

  • Size

    784KB

  • MD5

    384457d1ca48161017ad379c6a0ac4e0

  • SHA1

    fff416d61c3a07d130ee6e1c1affbf2d7266f166

  • SHA256

    a8a3d5c67349345d5a6f0906cb9da7bf7f8397392717377d14da2785e2559a37

  • SHA512

    28897bc6d5fa77087b34e4c66a85249cb08596b64845c5e78708482d97c505b8b824e1c7acdafafea4b79a102260ef1e70fc03665f0b981e17e75a7dc28ac05b

  • SSDEEP

    12288:GefX5bxGTsLvx/WvBLlmDLI/wA0qSniuMVGnmjKnRlgqdQ3QCNTL:GUX5dDFWLUkWqSnZMknmMIfr5L

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8a3d5c67349345d5a6f0906cb9da7bf7f8397392717377d14da2785e2559a37.exe
    "C:\Users\Admin\AppData\Local\Temp\a8a3d5c67349345d5a6f0906cb9da7bf7f8397392717377d14da2785e2559a37.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\a8a3d5c67349345d5a6f0906cb9da7bf7f8397392717377d14da2785e2559a37.exe
      C:\Users\Admin\AppData\Local\Temp\a8a3d5c67349345d5a6f0906cb9da7bf7f8397392717377d14da2785e2559a37.exe
      2⤵
      • Enumerates VirtualBox registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:1580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1580-73-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-76-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-56-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-58-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-61-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-64-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-55-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-67-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-92-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-70-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-79-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-82-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-85-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1580-88-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/1672-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

    Filesize

    8KB