Analysis
-
max time kernel
92s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 22:05
Behavioral task
behavioral1
Sample
b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe
Resource
win7-20221111-en
6 signatures
150 seconds
General
-
Target
b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe
-
Size
528KB
-
MD5
da5cb70ca520bbbbee81f6a84f8e98e4
-
SHA1
43663e04a91a1fefc6acb576d4aeeff00af18464
-
SHA256
b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0
-
SHA512
08feb2cbaa1286bedfe98fd7e6728eae85211eb12959af6489187c1e49e1397357ec38681be0e6eb62b4123a38c87d742aa0e1f0da694f1f0aa66014e8c06e92
-
SSDEEP
12288:hQpikUg8RfE2P2hekUFOtWRJlgOkno3KPfU:22P206kTlgZouc
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe -
resource yara_rule behavioral2/memory/4452-132-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/4452-146-0x0000000000400000-0x00000000004CB000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4452 set thread context of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 1052 4960 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4960 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 4960 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81 PID 4452 wrote to memory of 4960 4452 b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe"C:\Users\Admin\AppData\Local\Temp\b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exeC:\Users\Admin\AppData\Local\Temp\b095b6ac84c23f724d54a87a2fe93b047c568f68ed2a77a7daba9a422fb6eac0.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 5523⤵
- Program crash
PID:1052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4960 -ip 49601⤵PID:4936