Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
2208abd516f770e2318a73ddf767603c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2208abd516f770e2318a73ddf767603c.exe
Resource
win10v2004-20231222-en
General
-
Target
2208abd516f770e2318a73ddf767603c.exe
-
Size
512KB
-
MD5
2208abd516f770e2318a73ddf767603c
-
SHA1
9665a3caa5154845386a2981393087709e8c8bbc
-
SHA256
2127838b105ff8efd74d0c8ee8625afb2049fd9ecf5bb96696330d5ab18a32d9
-
SHA512
24f053f0ebcdf36e8dd8368ce7871d5129501dd2b1ed2c1944776de4b0df62c597e175716026c54f8446707c68cafd8890c18345200505ba05ebd062e8e794f6
-
SSDEEP
12288:0+h9St2Ma70zIIc91Dwws4zruXic2O/3E4w:0+h9OY70z+warul3E4w
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2208abd516f770e2318a73ddf767603c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 2208abd516f770e2318a73ddf767603c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 2208abd516f770e2318a73ddf767603c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4340 2208abd516f770e2318a73ddf767603c.exe 4340 2208abd516f770e2318a73ddf767603c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2208abd516f770e2318a73ddf767603c.exe"C:\Users\Admin\AppData\Local\Temp\2208abd516f770e2318a73ddf767603c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\n5732\s5732.exe"C:\Users\Admin\AppData\Local\Temp\n5732\s5732.exe" 3b2598bcfabc29e38b9df18c2xyP76wtnN0pH5QDkyK82coQ16k4oVF7O25Y/FvFRnkPTlDIHrki5/udTE5b/vng/eG5uTwonW0k4w6uaSyf9fU/+typMijWjIX5l+IKrpKaE9W7YnOOgOHil5VHbXBLwaxmYxutVS1XNa3HbKGPg4av /v "C:\Users\Admin\AppData\Local\Temp\2208abd516f770e2318a73ddf767603c.exe"2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5894622610cd7180155eed2a517369a92
SHA10fc3d6f4b034a8fd23ce2b75c07fb3bc45a5e798
SHA2560aaef338bef64d71746c2242b024898c62a66399f0f8c2906f43051ebdf5beb7
SHA512f8832ed64f96b7f1bcc0132594a87dc5ce283910b808d5534abef32e703aa15ecd5831a2f89509576ca90338ebb1a5fe96d2e5f2229f3930d49f718c5b8fe580