Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
300e99dd34979454a6291a22334a43b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
300e99dd34979454a6291a22334a43b1.exe
Resource
win10v2004-20231215-en
General
-
Target
300e99dd34979454a6291a22334a43b1.exe
-
Size
657KB
-
MD5
300e99dd34979454a6291a22334a43b1
-
SHA1
76a496fe1e70623ea251eb9a19525e0b72243100
-
SHA256
8c42b9ddda20405239bb3e9422e973c38730ce6f94cf7195848344e517ec3fd4
-
SHA512
512278e9cf7294112204212a99b9857d53b2f59591f39ccb4b4930ae56a0e1ee399c323aa46f90b6b18058041ee347694bd3ddb2718a79b91d3c0773dedff4ab
-
SSDEEP
12288:xhVB1Ev5Ng36lX4CdyZ73t0jPtFVYKzL5FxqiH0rfpkRqqFqqFqqJ6:xhVBCv5m4REiPney/wpkRqMqMqn
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 300e99dd34979454a6291a22334a43b1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2408 set thread context of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2396 300e99dd34979454a6291a22334a43b1.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28 PID 2408 wrote to memory of 2396 2408 300e99dd34979454a6291a22334a43b1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\300e99dd34979454a6291a22334a43b1.exe"C:\Users\Admin\AppData\Local\Temp\300e99dd34979454a6291a22334a43b1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\300e99dd34979454a6291a22334a43b1.exeC:\Users\Admin\AppData\Local\Temp\300e99dd34979454a6291a22334a43b1.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:2396
-