Analysis

  • max time kernel
    0s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 17:00

General

  • Target

    7eaeba2c714b9570d908b65a538a9ebc.exe

  • Size

    512KB

  • MD5

    7eaeba2c714b9570d908b65a538a9ebc

  • SHA1

    514cfa7e7d1960e3ea801dd0f6089353bc7b1ea2

  • SHA256

    069c46a2ae14fee1f68aa46783638808b0249390dc33071bf63dfb7f0d7c85cb

  • SHA512

    7009fee646d69aacf1deb3f506790692fd0e7cffd48034e50abf119c359f534d09cfda109523f073751d2b34e0c0cc9535c4bfc71273edd345287772d1b79ba2

  • SSDEEP

    12288:0+h9St2Ma70zIIc91Dwws4zruXic2O/3E4J:0+h9OY70z+warul3E4J

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eaeba2c714b9570d908b65a538a9ebc.exe
    "C:\Users\Admin\AppData\Local\Temp\7eaeba2c714b9570d908b65a538a9ebc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\n2559\s2559.exe
      "C:\Users\Admin\AppData\Local\Temp\n2559\s2559.exe" f1fc1f37a020e20f74132e90CPICTfkjqIyX/JTznYZE9mdLDpWyE0FgmsUC327YZJx6eixiiV3k1+C7s+iozukDPweefYp4Bgm+mL6SvlpjDKhrgIbbElRvoQbMAzHtdJ0VIozzjvpAKVp6QK03L/DEt467t3j8eG/L+fZjo1YgzYRg /v "C:\Users\Admin\AppData\Local\Temp\7eaeba2c714b9570d908b65a538a9ebc.exe"
      2⤵
        PID:1680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\n2559\s2559.exe

      Filesize

      92KB

      MD5

      894622610cd7180155eed2a517369a92

      SHA1

      0fc3d6f4b034a8fd23ce2b75c07fb3bc45a5e798

      SHA256

      0aaef338bef64d71746c2242b024898c62a66399f0f8c2906f43051ebdf5beb7

      SHA512

      f8832ed64f96b7f1bcc0132594a87dc5ce283910b808d5534abef32e703aa15ecd5831a2f89509576ca90338ebb1a5fe96d2e5f2229f3930d49f718c5b8fe580

    • memory/1680-78-0x0000000000A20000-0x0000000000AA0000-memory.dmp

      Filesize

      512KB

    • memory/1680-15-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-77-0x00000000004E0000-0x00000000004F2000-memory.dmp

      Filesize

      72KB

    • memory/1680-79-0x0000000000A20000-0x0000000000AA0000-memory.dmp

      Filesize

      512KB

    • memory/1680-16-0x0000000000A20000-0x0000000000AA0000-memory.dmp

      Filesize

      512KB

    • memory/1680-80-0x0000000000A20000-0x0000000000AA0000-memory.dmp

      Filesize

      512KB

    • memory/1680-82-0x0000000000A20000-0x0000000000AA0000-memory.dmp

      Filesize

      512KB

    • memory/1680-81-0x0000000000A20000-0x0000000000AA0000-memory.dmp

      Filesize

      512KB

    • memory/1680-83-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

      Filesize

      9.6MB

    • memory/1680-84-0x0000000000A20000-0x0000000000AA0000-memory.dmp

      Filesize

      512KB

    • memory/1680-85-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

      Filesize

      9.6MB