Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe
Resource
win10v2004-20240508-en
General
-
Target
3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe
-
Size
5.7MB
-
MD5
cd4ea39e30a7926dfcd6e7521c2c9cbf
-
SHA1
35dc0022b3cc18fc4b3775b36cbc090977662d21
-
SHA256
3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a
-
SHA512
e13310ff5a2bc0d69b2fd340d6bbb744828d157979b11f79217b504667efa8cdbbb052137522100cfabe9b801716699d85afec675aa8987e51faa737cf6e9026
-
SSDEEP
98304:j/6n94bDY2EBcBuq62V///4nAWakrn7S/IhWoaVVfs/VIsMF4JD8iulhq7NmmkVQ:mMD+cpvJ/4H3nmghWoa/fsysMF4JD852
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe Token: SeShutdownPrivilege 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3068 3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe"C:\Users\Admin\AppData\Local\Temp\3d1c2bc4387b338a49dac36317abbd7c56c09851802eb2d2dd705969911f8e8a.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51665738746c00841aa268e9b9baa2ec8
SHA1126a07b2e4796b88fa0d0272895599ea80b3b0b9
SHA256a5c6c644af6e1560d42afc9ee1cdcce70ec92942e5f33b335c0ccfb927b1b757
SHA5123dca5bfdba0468eec2447e87037b895f187acf8350e30d564fac4bb8518807288076e78b5aa1dc559031191766f7360e2b45d0350b5f78940b65b0c9d3386b62
-
Filesize
383B
MD54ca22bddf7815aaef6b0fa8b91a7cc2b
SHA1dc57aa16ecb7c40885f4b750740a63b61b787d26
SHA256be1df1706d3454f63eba1ff17eff57c84e54f9ab974b1662059343ca632c33aa
SHA51252a3815d18d5b8e3183781fb8ed864553d79b0471c5615a71d5426cc6ebd7748f5bfb568b719684190045bb3d73475ec7c8ec814a2c43161aaef8101c3d82302