Analysis
-
max time kernel
136s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe
Resource
win10v2004-20221111-en
General
-
Target
df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe
-
Size
494KB
-
MD5
c157719d0c33e2c8f93cd119be15ffd7
-
SHA1
7c9a9f3c9048958a8c65737b19a9e4a3cce1424b
-
SHA256
df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823
-
SHA512
9cd7eca48ab5efe17c7d2ea0d657d59a57ac5418538d087d280b86ab629fc1cb221e37b97df5328c4dabf8ce0375af0fda92579d50e2e85c51178463210157f8
-
SSDEEP
12288:adxn0zTR3VTGrwsCVdv5uILrMZ3MT7hKemV9tiqUltUZwln:a4R3deoVdv5uIYghKLhywwl
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1616 df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe"C:\Users\Admin\AppData\Local\Temp\df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe"1⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1616