Analysis

  • max time kernel
    180s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 20:26

General

  • Target

    3ca13674a0cd76d73fdd247028fa5e6983fe274492224666ca064f34a1231f8d.exe

  • Size

    712KB

  • MD5

    5308563d3c5492e1f8d01a41d1814854

  • SHA1

    3a16beddf0fa3c7cc82dd296eca855a851c6fe2f

  • SHA256

    3ca13674a0cd76d73fdd247028fa5e6983fe274492224666ca064f34a1231f8d

  • SHA512

    244814395e5ac308b146f8863ee1b3e91031d4338ec063dafd191b3e053c06f37bc8831bf978f8a2f394c50390d4d96446de5ba065c418a082622073be1b9172

  • SSDEEP

    12288:ECdQT2KcXhrK58Kh0N4kZbBXFxZSmCHYGzXWgJ952wRFbucAwoaVrslcpI:l+c+2KGN4+b4HLzl/ZRFy8oAo

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ca13674a0cd76d73fdd247028fa5e6983fe274492224666ca064f34a1231f8d.exe
    "C:\Users\Admin\AppData\Local\Temp\3ca13674a0cd76d73fdd247028fa5e6983fe274492224666ca064f34a1231f8d.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:4264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 620
      2⤵
      • Program crash
      PID:3676
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4264 -ip 4264
    1⤵
      PID:220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4264 -ip 4264
      1⤵
        PID:3872

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4264-132-0x00000000011E0000-0x00000000011E6000-memory.dmp

              Filesize

              24KB

            • memory/4264-133-0x0000000000C60000-0x0000000000D50000-memory.dmp

              Filesize

              960KB

            • memory/4264-134-0x00000000011E0000-0x00000000011E6000-memory.dmp

              Filesize

              24KB

            • memory/4264-135-0x00000000011E0000-0x00000000011E3000-memory.dmp

              Filesize

              12KB

            • memory/4264-136-0x0000000000C60000-0x0000000000D50000-memory.dmp

              Filesize

              960KB