Analysis
-
max time kernel
1s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:09
Behavioral task
behavioral1
Sample
fbc208d4a525f449c25074b21a1784b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fbc208d4a525f449c25074b21a1784b6.exe
Resource
win10v2004-20231215-en
General
-
Target
fbc208d4a525f449c25074b21a1784b6.exe
-
Size
3.2MB
-
MD5
fbc208d4a525f449c25074b21a1784b6
-
SHA1
128dfd563f281370b3f34ac15de96875bf47c148
-
SHA256
6f8978e9e9dfbabd48136fa088d5d4aec70365714a023f600469a8019dd99c2d
-
SHA512
ebbc3ba7a4d5297f92ef3452259dde760dce6092dd2183af5a4c8f78a0e1f99334d61bcbb9957914aaa41daac8a0af775300fcb56073fb6eac9ee81cc0286738
-
SSDEEP
49152:taj0As03hf/c40nIFkR9hv5ZDLg45V9gVfW7dvdryINFQY/kxrJEIpEHmkeY:20URJ0nIFkD/ZZ32AvELukxN/EG
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest fbc208d4a525f449c25074b21a1784b6.exe -
resource yara_rule behavioral1/memory/2444-0-0x0000000013140000-0x0000000013782000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\Q: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\S: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\Z: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\E: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\G: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\I: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\L: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\H: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\N: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\O: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\K: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\P: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\T: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\W: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\X: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\Y: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\J: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\R: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\U: fbc208d4a525f449c25074b21a1784b6.exe File opened (read-only) \??\V: fbc208d4a525f449c25074b21a1784b6.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fbc208d4a525f449c25074b21a1784b6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2708 2444 WerFault.exe 14 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2444 fbc208d4a525f449c25074b21a1784b6.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 2444 fbc208d4a525f449c25074b21a1784b6.exe Token: SeLoadDriverPrivilege 2444 fbc208d4a525f449c25074b21a1784b6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1628 2444 fbc208d4a525f449c25074b21a1784b6.exe 22 PID 2444 wrote to memory of 1628 2444 fbc208d4a525f449c25074b21a1784b6.exe 22 PID 2444 wrote to memory of 1628 2444 fbc208d4a525f449c25074b21a1784b6.exe 22 PID 2444 wrote to memory of 1628 2444 fbc208d4a525f449c25074b21a1784b6.exe 22 PID 2444 wrote to memory of 2708 2444 fbc208d4a525f449c25074b21a1784b6.exe 23 PID 2444 wrote to memory of 2708 2444 fbc208d4a525f449c25074b21a1784b6.exe 23 PID 2444 wrote to memory of 2708 2444 fbc208d4a525f449c25074b21a1784b6.exe 23 PID 2444 wrote to memory of 2708 2444 fbc208d4a525f449c25074b21a1784b6.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc208d4a525f449c25074b21a1784b6.exe"C:\Users\Admin\AppData\Local\Temp\fbc208d4a525f449c25074b21a1784b6.exe"1⤵
- Enumerates VirtualBox registry keys
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\del.bat"2⤵PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 3362⤵
- Program crash
PID:2708
-