Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 00:40

General

  • Target

    2208abd516f770e2318a73ddf767603c.exe

  • Size

    512KB

  • MD5

    2208abd516f770e2318a73ddf767603c

  • SHA1

    9665a3caa5154845386a2981393087709e8c8bbc

  • SHA256

    2127838b105ff8efd74d0c8ee8625afb2049fd9ecf5bb96696330d5ab18a32d9

  • SHA512

    24f053f0ebcdf36e8dd8368ce7871d5129501dd2b1ed2c1944776de4b0df62c597e175716026c54f8446707c68cafd8890c18345200505ba05ebd062e8e794f6

  • SSDEEP

    12288:0+h9St2Ma70zIIc91Dwws4zruXic2O/3E4w:0+h9OY70z+warul3E4w

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2208abd516f770e2318a73ddf767603c.exe
    "C:\Users\Admin\AppData\Local\Temp\2208abd516f770e2318a73ddf767603c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:4340
    • C:\Users\Admin\AppData\Local\Temp\n5732\s5732.exe
      "C:\Users\Admin\AppData\Local\Temp\n5732\s5732.exe" 3b2598bcfabc29e38b9df18c2xyP76wtnN0pH5QDkyK82coQ16k4oVF7O25Y/FvFRnkPTlDIHrki5/udTE5b/vng/eG5uTwonW0k4w6uaSyf9fU/+typMijWjIX5l+IKrpKaE9W7YnOOgOHil5VHbXBLwaxmYxutVS1XNa3HbKGPg4av /v "C:\Users\Admin\AppData\Local\Temp\2208abd516f770e2318a73ddf767603c.exe"
      2⤵
        PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\n5732\s5732.exe

      Filesize

      92KB

      MD5

      894622610cd7180155eed2a517369a92

      SHA1

      0fc3d6f4b034a8fd23ce2b75c07fb3bc45a5e798

      SHA256

      0aaef338bef64d71746c2242b024898c62a66399f0f8c2906f43051ebdf5beb7

      SHA512

      f8832ed64f96b7f1bcc0132594a87dc5ce283910b808d5534abef32e703aa15ecd5831a2f89509576ca90338ebb1a5fe96d2e5f2229f3930d49f718c5b8fe580

    • memory/2668-34-0x000000001BC50000-0x000000001BC58000-memory.dmp

      Filesize

      32KB

    • memory/2668-39-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

      Filesize

      64KB

    • memory/2668-27-0x000000001BB70000-0x000000001BB82000-memory.dmp

      Filesize

      72KB

    • memory/2668-31-0x000000001CAF0000-0x000000001CB8C000-memory.dmp

      Filesize

      624KB

    • memory/2668-30-0x000000001C580000-0x000000001CA4E000-memory.dmp

      Filesize

      4.8MB

    • memory/2668-32-0x000000001CC80000-0x000000001CCE2000-memory.dmp

      Filesize

      392KB

    • memory/2668-33-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

      Filesize

      64KB

    • memory/2668-13-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

      Filesize

      64KB

    • memory/2668-12-0x00007FFFE9330000-0x00007FFFE9CD1000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-35-0x00007FFFE9330000-0x00007FFFE9CD1000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-36-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

      Filesize

      64KB

    • memory/2668-40-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

      Filesize

      64KB

    • memory/2668-41-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

      Filesize

      64KB

    • memory/2668-38-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

      Filesize

      64KB

    • memory/2668-37-0x00007FFFE9330000-0x00007FFFE9CD1000-memory.dmp

      Filesize

      9.6MB

    • memory/2668-42-0x0000000020810000-0x0000000020D1E000-memory.dmp

      Filesize

      5.1MB

    • memory/2668-43-0x0000000020F60000-0x000000002109C000-memory.dmp

      Filesize

      1.2MB

    • memory/2668-45-0x00007FFFE9330000-0x00007FFFE9CD1000-memory.dmp

      Filesize

      9.6MB