Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 08:04

General

  • Target

    79b4dba41f216ff4890ecd5d3529654e.exe

  • Size

    764KB

  • MD5

    79b4dba41f216ff4890ecd5d3529654e

  • SHA1

    a250d93abed7c4f7f459b1cb0f956aba13f691b6

  • SHA256

    5d542b717edb20184adf5d24e78e325b21087212c4aff26028174c4b74d8dbc0

  • SHA512

    f5bcc2fbb2db8c851648088f04dbc8f8b43fc69b71127a90036894a83c6da983a67519710a918475efedda76a95eef600abe9c39b1b2e08053b0ccdccc9e6e02

  • SSDEEP

    12288:v1b6EruDubGuTYMwXyBUvh++IK0LiJQO7b7+RrDxtftG8Kv:v1b6WbvwskcKZQibSD30

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79b4dba41f216ff4890ecd5d3529654e.exe
    "C:\Users\Admin\AppData\Local\Temp\79b4dba41f216ff4890ecd5d3529654e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\79b4dba41f216ff4890ecd5d3529654e.exe
      C:\Users\Admin\AppData\Local\Temp\79b4dba41f216ff4890ecd5d3529654e.exe
      2⤵
      • Enumerates VirtualBox registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:2164

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1716-0-0x0000000000400000-0x000000000054A000-memory.dmp

          Filesize

          1.3MB

        • memory/1716-1-0x0000000000400000-0x000000000054A000-memory.dmp

          Filesize

          1.3MB

        • memory/1716-2-0x0000000000400000-0x000000000054A000-memory.dmp

          Filesize

          1.3MB

        • memory/1716-3-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1716-42-0x0000000000400000-0x000000000054A000-memory.dmp

          Filesize

          1.3MB

        • memory/2164-20-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-26-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-11-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-14-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-17-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-4-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-23-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-8-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-29-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-32-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-35-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-38-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-39-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2164-6-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-43-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2164-44-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB