Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 05:50
Behavioral task
behavioral1
Sample
f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe
Resource
win7-20220812-en
5 signatures
150 seconds
General
-
Target
f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe
-
Size
425KB
-
MD5
960077584a9a28a30aa7852377e90823
-
SHA1
c4660e6f8fc68eb4adf0c426b944e10e5a6a96b2
-
SHA256
f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828
-
SHA512
3b1188d1c47908e5734bc277cf6aad03d8f9b80abdbc8290574f450e2ecacbb9bb8e974c87862a19b75aa9a255f72b84dd3ba3821d84aee695517533ccd07b12
-
SSDEEP
12288:AvksbzLf6N9/L7pGbk80/8LOdJFWzHdZDQIB+7OgWBx:AcIDm7Ybk80IKKHdZMOgUx
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe File created C:\Windows\system32\drivers\etc\hosts f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe -
resource yara_rule behavioral1/memory/1148-55-0x00000000009D0000-0x0000000000A8A000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1148 f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe"C:\Users\Admin\AppData\Local\Temp\f3e65b613ad18cea4e3a769c7a69c85bc2c270d357a13fb5e68112f115649828.exe"1⤵
- Enumerates VirtualBox registry keys
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
PID:1148