Analysis

  • max time kernel
    111s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 14:02

General

  • Target

    bf2968a9167961617ac3713fcae0bbcf90adba77187ef93d6a21527829181467.exe

  • Size

    491KB

  • MD5

    8d1369a68843e7eedc4b91c45a51afca

  • SHA1

    c6b419d2ef0a203f1b52b09ed21aaa7e630fcb15

  • SHA256

    bf2968a9167961617ac3713fcae0bbcf90adba77187ef93d6a21527829181467

  • SHA512

    dc0308ed51046a49b009dab68543c4b80e822336a7dbb8cec51b01158da48b43754371a2abf1f1ed35dda3692601aaf1ed0306532f23550a20ae0a10992fa242

  • SSDEEP

    12288:QKmNckDqBUNHQOXuPG/3K05GWNnYlVSHLtPlt:jmNcmqiafe/CWNnYlVShN

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf2968a9167961617ac3713fcae0bbcf90adba77187ef93d6a21527829181467.exe
    "C:\Users\Admin\AppData\Local\Temp\bf2968a9167961617ac3713fcae0bbcf90adba77187ef93d6a21527829181467.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    PID:1064

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1064-132-0x0000000000D60000-0x0000000000D6D000-memory.dmp

    Filesize

    52KB

  • memory/1064-133-0x0000000000D60000-0x0000000000D6D000-memory.dmp

    Filesize

    52KB

  • memory/1064-134-0x0000000000D60000-0x0000000000D63000-memory.dmp

    Filesize

    12KB

  • memory/1064-136-0x0000000000D60000-0x0000000000D63000-memory.dmp

    Filesize

    12KB

  • memory/1064-135-0x0000000000D60000-0x0000000000D6D000-memory.dmp

    Filesize

    52KB

  • memory/1064-137-0x0000000000020000-0x00000000000EC000-memory.dmp

    Filesize

    816KB

  • memory/1064-138-0x0000000000020000-0x00000000000EC000-memory.dmp

    Filesize

    816KB

  • memory/1064-139-0x0000000000020000-0x00000000000EC000-memory.dmp

    Filesize

    816KB