Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 19:46
Behavioral task
behavioral1
Sample
8d308d064922814330a8aaa355d9974d.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
8d308d064922814330a8aaa355d9974d.exe
-
Size
472KB
-
MD5
8d308d064922814330a8aaa355d9974d
-
SHA1
4eb03abe567e5d2ca12c5b124fd2f73888d3f3af
-
SHA256
4fe1a6248dc75e6d34dd12ec663629150f6205bd580c054f139fd0447d31f17e
-
SHA512
4189878da2cc893551cbc6920fd692b1f5a623db6c13c1932af4a6bd46af208a8618c49d76ddb68f568c47c4e059a8f0059f30c55ea23a671d0956ccbec07cee
-
SSDEEP
12288:9XrfSVYQy6JYGuglDIa5iPXdpDFhHcQWrBJu:9r7Q3YglDI1PNpHfm6
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 8d308d064922814330a8aaa355d9974d.exe -
resource yara_rule behavioral1/memory/1868-0-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1868-1-0x0000000001EF0000-0x0000000001FB5000-memory.dmp upx behavioral1/memory/1868-40-0x0000000000400000-0x00000000004C5000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1604 8d308d064922814330a8aaa355d9974d.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28 PID 1868 wrote to memory of 1604 1868 8d308d064922814330a8aaa355d9974d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exe"C:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exeC:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1604
-