Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
f770c2d1cdf5342b4d4ab125dc7d579d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f770c2d1cdf5342b4d4ab125dc7d579d.exe
Resource
win10v2004-20231222-en
General
-
Target
f770c2d1cdf5342b4d4ab125dc7d579d.exe
-
Size
899KB
-
MD5
f770c2d1cdf5342b4d4ab125dc7d579d
-
SHA1
5d134911b22a90260f6afe0d1e8011ac6eed4736
-
SHA256
23dc29c21e9b12bfea4578988908c8a810b5d0a4a2d1922ca2de73a2d0f53285
-
SHA512
0e1f89b9e0e5f0ee4dfa5f6c18900709c92a6c51e83dcab3b6f46ca96538f2d77af3b640b35edebd06e01549419eeb9c45cc6707b376d32175597c80c5e5b285
-
SSDEEP
24576:JxGa4DpzkdGp9JcK68JlCYRK+ILTfBLXSYoy:Caq9GKC7+CK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp -
Loads dropped DLL 9 IoCs
pid Process 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN f770c2d1cdf5342b4d4ab125dc7d579d.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 532 f770c2d1cdf5342b4d4ab125dc7d579d.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3412 wrote to memory of 532 3412 f770c2d1cdf5342b4d4ab125dc7d579d.exe 24 PID 3412 wrote to memory of 532 3412 f770c2d1cdf5342b4d4ab125dc7d579d.exe 24 PID 3412 wrote to memory of 532 3412 f770c2d1cdf5342b4d4ab125dc7d579d.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\f770c2d1cdf5342b4d4ab125dc7d579d.exe"C:\Users\Admin\AppData\Local\Temp\f770c2d1cdf5342b4d4ab125dc7d579d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\is-5O0KH.tmp\f770c2d1cdf5342b4d4ab125dc7d579d.tmp"C:\Users\Admin\AppData\Local\Temp\is-5O0KH.tmp\f770c2d1cdf5342b4d4ab125dc7d579d.tmp" /SL5="$401D6,500774,146432,C:\Users\Admin\AppData\Local\Temp\f770c2d1cdf5342b4d4ab125dc7d579d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious use of AdjustPrivilegeToken
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5656c9643a4b94afe3348cde2778b1143
SHA13a48e45010994b54edda17dc68241adaef469ff4
SHA256c7f1cac86c81c10ea0b3288ad58c086d199bd365e7adcfe92685e9127005914e
SHA512c4bf1eaf9121738f1203f2f583b4ede84c4db0b9bf3e125865fa2858bf37755d506dcc1b0cbbdc77bcead0998e647d99dcc733cc20a9e02130c30b830bd70cf1