Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 01:50

General

  • Target

    a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe

  • Size

    17.6MB

  • MD5

    09936bec5ef511e3faf6cf174df4345b

  • SHA1

    90602dbf90f192207efede8772398f90aea79ec3

  • SHA256

    a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005

  • SHA512

    22582ce6cebb938241e7c7d5d89468fda1e09b1569ce78b6f78a922a2b263f88b838a79cf3ee6effa8701f9ee5d5c8fc44b269c43a34d5b0950b88c3ff030fc5

  • SSDEEP

    393216:gYZf5+zosIYmy8CcnsOapxtH+MLMzylBGFlR03ptEPdR7u:NZf5+0lLPnVapxtxMzylB+0kdc

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe
    "C:\Users\Admin\AppData\Local\Temp\a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2580-0-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-1-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-2-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-3-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-4-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-6-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-8-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-10-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-12-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-14-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB

  • memory/2580-16-0x0000000140000000-0x00000001422DA000-memory.dmp

    Filesize

    34.9MB