Analysis

  • max time kernel
    177s
  • max time network
    217s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 09:24

General

  • Target

    0e0b0b50efc3a1585f5dc29386159c3cffcaa1668e88ef80ecfa082a7bb0a9fd.exe

  • Size

    665KB

  • MD5

    31b40951ec7ff4b6c2621133c6a8e830

  • SHA1

    317a00aa6d13e7d9694732f4e3c2036a945323ed

  • SHA256

    0e0b0b50efc3a1585f5dc29386159c3cffcaa1668e88ef80ecfa082a7bb0a9fd

  • SHA512

    49f171acd0954b29d192693e13e4e2c18bade2fa6b1a35aab22e34665c9a197b5be5c2929df24829c8dca3d7dbec663555b0353cb6da74b6e941e4b46cb0646c

  • SSDEEP

    12288:tTthTBbSeQbOtCqpOEeaE76iFFT4HfbJbLckW2VwiuN3QQc2rU5s/FV:JtFBbSettlpY76ET4/bJbgklwiogDHQ

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e0b0b50efc3a1585f5dc29386159c3cffcaa1668e88ef80ecfa082a7bb0a9fd.exe
    "C:\Users\Admin\AppData\Local\Temp\0e0b0b50efc3a1585f5dc29386159c3cffcaa1668e88ef80ecfa082a7bb0a9fd.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads