Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
fba1fb648a79557654e3ab78268a974c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fba1fb648a79557654e3ab78268a974c.exe
Resource
win10v2004-20231215-en
General
-
Target
fba1fb648a79557654e3ab78268a974c.exe
-
Size
823KB
-
MD5
fba1fb648a79557654e3ab78268a974c
-
SHA1
329007363ae6fe21193de7088e60df73b207fd44
-
SHA256
897f9246d8fe238acb24e20b9cad9357c967699632195c4e9dcb2e4b2b531b9b
-
SHA512
d70e64dc13e6cbdf8f5db64c3e0266e2eb3f6e8164d46a63c34f11fee4b2683abc02b46890f721b03daaae0fb004193fa70ae33e37ff5b36edee7364094954b9
-
SSDEEP
24576:UpWQqIQI7fY7/ur1pLggxvd7Jna5Bf991i:UmIQIu2r1psgx11na5BFy
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest fba1fb648a79557654e3ab78268a974c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2932 set thread context of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2936 fba1fb648a79557654e3ab78268a974c.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28 PID 2932 wrote to memory of 2936 2932 fba1fb648a79557654e3ab78268a974c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba1fb648a79557654e3ab78268a974c.exe"C:\Users\Admin\AppData\Local\Temp\fba1fb648a79557654e3ab78268a974c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\fba1fb648a79557654e3ab78268a974c.exeC:\Users\Admin\AppData\Local\Temp\fba1fb648a79557654e3ab78268a974c.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:2936
-