Analysis

  • max time kernel
    280s
  • max time network
    361s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 14:02

General

  • Target

    df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe

  • Size

    494KB

  • MD5

    c157719d0c33e2c8f93cd119be15ffd7

  • SHA1

    7c9a9f3c9048958a8c65737b19a9e4a3cce1424b

  • SHA256

    df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823

  • SHA512

    9cd7eca48ab5efe17c7d2ea0d657d59a57ac5418538d087d280b86ab629fc1cb221e37b97df5328c4dabf8ce0375af0fda92579d50e2e85c51178463210157f8

  • SSDEEP

    12288:adxn0zTR3VTGrwsCVdv5uILrMZ3MT7hKemV9tiqUltUZwln:a4R3deoVdv5uIYghKLhywwl

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe
    "C:\Users\Admin\AppData\Local\Temp\df980381c255db03682bacf2a6931ee0f49846aaef0e6170d393fa3dd8e75823.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:4560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4560-132-0x0000000000620000-0x000000000062F000-memory.dmp

    Filesize

    60KB

  • memory/4560-133-0x0000000000620000-0x000000000062F000-memory.dmp

    Filesize

    60KB

  • memory/4560-134-0x0000000000620000-0x0000000000623000-memory.dmp

    Filesize

    12KB

  • memory/4560-135-0x0000000000C30000-0x0000000000CF9000-memory.dmp

    Filesize

    804KB

  • memory/4560-136-0x0000000000620000-0x000000000062F000-memory.dmp

    Filesize

    60KB

  • memory/4560-137-0x0000000000620000-0x0000000000623000-memory.dmp

    Filesize

    12KB