Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 02:43

General

  • Target

    706f338bc4052cb87d1c69cd70de80e9.exe

  • Size

    47KB

  • MD5

    706f338bc4052cb87d1c69cd70de80e9

  • SHA1

    6f11ae7f139e261c7768046b5780eb784bcf7a2d

  • SHA256

    3e799bf4528c3c0205a15c994ea6007e2cba2aa9b936bedc48689926fbd12030

  • SHA512

    bfe06462ec80cdc40a366002d01963aed6039a0243172a16510f215bddf8528340c4d76d8465fcf368125d71c65ead20e0f642f65dd54028a69f2ee7e92e72e7

  • SSDEEP

    768:Ba5rLMFvAV6JAfTfO+Q82AgfAUbZ6EdIfc9eDWl0GpTtYcFwVc6K:BmrLMFvG6XbAgflbgEdI5DepDwVcl

Score
9/10

Malware Config

Signatures

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\706f338bc4052cb87d1c69cd70de80e9.exe
    "C:\Users\Admin\AppData\Local\Temp\706f338bc4052cb87d1c69cd70de80e9.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4944-0-0x0000000074400000-0x0000000074BB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4944-1-0x0000000000330000-0x0000000000342000-memory.dmp

    Filesize

    72KB

  • memory/4944-2-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4944-3-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4944-4-0x00000000055B0000-0x00000000055EC000-memory.dmp

    Filesize

    240KB

  • memory/4944-5-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4944-6-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4944-7-0x0000000074400000-0x0000000074BB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4944-8-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4944-9-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4944-10-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB