Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 02:25

General

  • Target

    fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c.exe

  • Size

    871KB

  • MD5

    2abc28bccfd4512e91ac2b8f3537c307

  • SHA1

    c5111761aeec5523798ebe82438a5064f58b9459

  • SHA256

    fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c

  • SHA512

    07d92494e91c9502e33b76c2593ede82981ca6815bdfb1793b07331a8f86628fc5e56b1184eb1f80d78b74843289f5e042d200d75a298d084d0f2a035a7cfc22

  • SSDEEP

    12288:i+19eRK6BdJ7Tv6u+ixobvDp6Aqxizx+6eH0Mmh+mbNGTE3/3PrfyqUQejzT6H0G:iC6B1+ixmpbqx

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c.exe
    "C:\Users\Admin\AppData\Local\Temp\fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Enumerates VirtualBox registry keys
    • Windows security modification
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1284-5-0x00000000701D1000-0x00000000701D2000-memory.dmp

    Filesize

    4KB

  • memory/1284-6-0x00000000701D0000-0x000000007077B000-memory.dmp

    Filesize

    5.7MB

  • memory/1284-7-0x00000000701D0000-0x000000007077B000-memory.dmp

    Filesize

    5.7MB

  • memory/1284-8-0x00000000701D0000-0x000000007077B000-memory.dmp

    Filesize

    5.7MB

  • memory/1284-9-0x00000000701D0000-0x000000007077B000-memory.dmp

    Filesize

    5.7MB

  • memory/1284-10-0x00000000701D0000-0x000000007077B000-memory.dmp

    Filesize

    5.7MB

  • memory/2980-0-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/2980-1-0x00000000002F0000-0x00000000003D0000-memory.dmp

    Filesize

    896KB

  • memory/2980-2-0x0000000074430000-0x0000000074B1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2980-11-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/2980-12-0x0000000074430000-0x0000000074B1E000-memory.dmp

    Filesize

    6.9MB