Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
7eaeba2c714b9570d908b65a538a9ebc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7eaeba2c714b9570d908b65a538a9ebc.exe
Resource
win10v2004-20231215-en
General
-
Target
7eaeba2c714b9570d908b65a538a9ebc.exe
-
Size
512KB
-
MD5
7eaeba2c714b9570d908b65a538a9ebc
-
SHA1
514cfa7e7d1960e3ea801dd0f6089353bc7b1ea2
-
SHA256
069c46a2ae14fee1f68aa46783638808b0249390dc33071bf63dfb7f0d7c85cb
-
SHA512
7009fee646d69aacf1deb3f506790692fd0e7cffd48034e50abf119c359f534d09cfda109523f073751d2b34e0c0cc9535c4bfc71273edd345287772d1b79ba2
-
SSDEEP
12288:0+h9St2Ma70zIIc91Dwws4zruXic2O/3E4J:0+h9OY70z+warul3E4J
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7eaeba2c714b9570d908b65a538a9ebc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 7eaeba2c714b9570d908b65a538a9ebc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 7eaeba2c714b9570d908b65a538a9ebc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2344 7eaeba2c714b9570d908b65a538a9ebc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eaeba2c714b9570d908b65a538a9ebc.exe"C:\Users\Admin\AppData\Local\Temp\7eaeba2c714b9570d908b65a538a9ebc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\n2559\s2559.exe"C:\Users\Admin\AppData\Local\Temp\n2559\s2559.exe" f1fc1f37a020e20f74132e90CPICTfkjqIyX/JTznYZE9mdLDpWyE0FgmsUC327YZJx6eixiiV3k1+C7s+iozukDPweefYp4Bgm+mL6SvlpjDKhrgIbbElRvoQbMAzHtdJ0VIozzjvpAKVp6QK03L/DEt467t3j8eG/L+fZjo1YgzYRg /v "C:\Users\Admin\AppData\Local\Temp\7eaeba2c714b9570d908b65a538a9ebc.exe"2⤵PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5894622610cd7180155eed2a517369a92
SHA10fc3d6f4b034a8fd23ce2b75c07fb3bc45a5e798
SHA2560aaef338bef64d71746c2242b024898c62a66399f0f8c2906f43051ebdf5beb7
SHA512f8832ed64f96b7f1bcc0132594a87dc5ce283910b808d5534abef32e703aa15ecd5831a2f89509576ca90338ebb1a5fe96d2e5f2229f3930d49f718c5b8fe580