Analysis
-
max time kernel
136s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 11:48
Behavioral task
behavioral1
Sample
99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
General
-
Target
99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe
-
Size
484KB
-
MD5
15ad650cadb2870f945403cf6ecfcc6f
-
SHA1
650c2243fec1264ee5a52a0c5396eda5cd85d8b7
-
SHA256
99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a
-
SHA512
b3c87b8c4087601276e18107d90073e0eb73707352f8a895843da95d1f9b11037006d96db96c23b5040ba513a25a9d211a3d70f8115efcc9dedeb6b5ecd2b501
-
SSDEEP
12288:e23l1Fbni953LoeGUF7cpQrCOENiVCjuTFr173Cygz:eYlvi9BHGUJcdNNSCaTFB7dgz
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe -
resource yara_rule behavioral2/memory/1756-132-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1756-146-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 -
Program crash 1 IoCs
pid pid_target Process procid_target 3816 2852 WerFault.exe 76 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2852 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 2852 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76 PID 1756 wrote to memory of 2852 1756 99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe"C:\Users\Admin\AppData\Local\Temp\99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exeC:\Users\Admin\AppData\Local\Temp\99d240e31c857fe7c5f498f2d30135d2f4a76789790bd78eb820ecde79b5db8a.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 5283⤵
- Program crash
PID:3816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2852 -ip 28521⤵PID:3428