Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 05:48

General

  • Target

    58237262ae627b586fb030da24e23e56.exe

  • Size

    595KB

  • MD5

    58237262ae627b586fb030da24e23e56

  • SHA1

    f12901c5a7580903814085ba2705c02bd2bd210f

  • SHA256

    4c7f5ffeae58fdf7f3e8f21cdc13ef732f5d05e0c93bdc4d53d083d5bad97b4a

  • SHA512

    2363bb4392e1198e4c937a2046c567f3650b7913a679093daedd0509873226dbab85e933ec261ba8e04801bf8e4afee8db702a0bdea64bb044c015aa2b04bb6e

  • SSDEEP

    12288:lAHWgKie267njcAaRkOlIIH2pVNAapVeEwcUjw/Hpxy:9gKq67nQzkDNAapVebbw/JM

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58237262ae627b586fb030da24e23e56.exe
    "C:\Users\Admin\AppData\Local\Temp\58237262ae627b586fb030da24e23e56.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\58237262ae627b586fb030da24e23e56.exe
      C:\Users\Admin\AppData\Local\Temp\58237262ae627b586fb030da24e23e56.exe
      2⤵
      • Enumerates VirtualBox registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2152-20-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-23-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-44-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-43-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-4-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-6-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-8-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-11-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-14-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-17-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-39-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2152-26-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-38-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-29-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-32-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2152-35-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2436-0-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB

  • memory/2436-1-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB

  • memory/2436-42-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB

  • memory/2436-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2436-2-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB