Analysis

  • max time kernel
    200s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 19:47

General

  • Target

    bff06b665a4b3023b58c008a02d0c7b24532b908df455f7d88b6afbe1823451a.exe

  • Size

    1.1MB

  • MD5

    5ddccd50bd44a7e946f5f9f6c614d8ca

  • SHA1

    07609efb80ebdbd94d97ec14320093b541c3bb49

  • SHA256

    bff06b665a4b3023b58c008a02d0c7b24532b908df455f7d88b6afbe1823451a

  • SHA512

    fb1e5cbee01b68afa0cd5bb65b5f3a7b5275de7c854eb4674d4815f555c3b2db4783f0cae42423757e5cba8c59b63d49f4e1c5bd0e13c66c601f95711e81c915

  • SSDEEP

    12288:vVCfHS4Ba9UDq5b2r2tt4IImsIjQjcJ8wLG7HMTl6lTRgeC00OcBZlyMdyvF7CWO:9CffaSDqp2Jms2jijlTu00OWuM0hGa

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bff06b665a4b3023b58c008a02d0c7b24532b908df455f7d88b6afbe1823451a.exe
    "C:\Users\Admin\AppData\Local\Temp\bff06b665a4b3023b58c008a02d0c7b24532b908df455f7d88b6afbe1823451a.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:3076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 656
      2⤵
      • Program crash
      PID:1268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 652
      2⤵
      • Program crash
      PID:2144
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3076 -ip 3076
    1⤵
      PID:5092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3076 -ip 3076
      1⤵
        PID:3520

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3076-132-0x0000000001800000-0x0000000001803000-memory.dmp

        Filesize

        12KB

      • memory/3076-133-0x0000000000400000-0x0000000001517000-memory.dmp

        Filesize

        17.1MB

      • memory/3076-134-0x0000000001800000-0x0000000001803000-memory.dmp

        Filesize

        12KB

      • memory/3076-135-0x0000000000400000-0x0000000001517000-memory.dmp

        Filesize

        17.1MB