Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 20:03
Static task
static1
Behavioral task
behavioral1
Sample
a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe
Resource
win10v2004-20220812-en
General
-
Target
a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe
-
Size
705KB
-
MD5
5ef90347418ee85c25218b1841811f09
-
SHA1
1aadfb3eb505116bc0c55c6862946c80d47eefca
-
SHA256
a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9
-
SHA512
4ea182484cf2e724aede6e7043e8910ca0fea4c1c2ae3fbe0f578dfca907a372b81cf26b597f00a3bf22bcc32cfa804107136d4f877019ef974fd59f15304312
-
SSDEEP
12288:KBG+VQT4FFfrinu72PsdcFaYEtwaIL1s4QEi0rH/Z6swc6hTtjfnUs:z+VQaxiuyJBzaIhPQ90rHhfwc0tjfP
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 832 set thread context of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1692 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28 PID 832 wrote to memory of 1692 832 a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe"C:\Users\Admin\AppData\Local\Temp\a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exeC:\Users\Admin\AppData\Local\Temp\a65a7c3d68bb524e3841b8b93abb8c9687cd5363ff842159b821bce9083bd1e9.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1692
-