Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 15:45
Static task
static1
Behavioral task
behavioral1
Sample
17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253.exe
Resource
win10v2004-20221111-en
General
-
Target
17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253.exe
-
Size
922KB
-
MD5
7f24db5f6cdce3c80d85da1805f543c0
-
SHA1
f9e71e829174fff000eb213876bdf7657d250578
-
SHA256
17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253
-
SHA512
075065dd3ac5a018e177953a891c8e6c618c4ddf81781cbd78a73496ec4a8cc69b489aecb6080c6b4760ed19d6bad0062c2f939204ebf9df2dae7c5f73166781
-
SSDEEP
12288:YN57nGxWHBson4OHwIUdRZGUQ8v5qRGIOtfc72DKLKEkGcq4sFNHTW8dOXvE:YEO8P1Q4wROfrueEkGcq7/HT90Xv
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1824 17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253.exe"C:\Users\Admin\AppData\Local\Temp\17c90274d665dd5a5af6655ed0d885da026b76033365e0ba85b2052645573253.exe"1⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1824