Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe
Resource
win10v2004-20240508-en
General
-
Target
206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe
-
Size
5.7MB
-
MD5
97619e785622c48db4448be58e19e4b9
-
SHA1
04872bc353250cbb7fbdbc2f1b43cd5202bb6137
-
SHA256
206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e
-
SHA512
f91006e96d3179c8c824e2bea0fc3617044b03ace020fe71a2426ba2b0cd5fa782a0a20486d117f9fec037ea35da4268aeeb7ac808cf44699491cea10dd818f1
-
SSDEEP
98304:b/6n94bDY2EBcBuq62V///4nAWakrn7S/IhWoaVVfs/VIsMF4JD8iulhq7Nm+kVG:uMD+cpvJ/4H3nmghWoa/fsysMF4JD85c
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1688 206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe 1688 206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1688 206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe"C:\Users\Admin\AppData\Local\Temp\206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3240,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=4048 /prefetch:81⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD5396828d8ac7182fa54f6ff8225c59e61
SHA1dd6f86f95133fc2bfd73f549cf6e1a734cbeaa97
SHA2560f60502cfbc0ca323e1afbf1d7d98a7fb6e6080b3e2bd39d7c7cb6f0d5611dfb
SHA5128918a615824e768979420142e13d9539733eedc9071053b6b85441cf6e3c7899384e2eee87c94743c6bea5e949ac1fc28e7bcc9a195cbc612d32d516ee35d459
-
Filesize
308B
MD5de88e19cad3b8796df9aa6ffc6f0b47f
SHA121b1a86b3478abc957826439c65d23736d4ac800
SHA2569eeeefb7016e6823561e51efeed94676c0da4870fd477651f7e9abfb9409956d
SHA5129692970835115a48611a2b48ab631cdc6f9df99e692f3f5de6d722db3ca74e2b891eaa1a9babe86de07e9e6742677186b569b5327af4201f1e257dc337cd0bd9
-
Filesize
4KB
MD5aa98545da781123b8d1a8ccc238617e7
SHA1e78219892ae046c343f5858c0638ad155380146a
SHA256218d8e15323ceba3cb18a61a87a9911785e04ad0cf957dc3f55a928632178b4e
SHA512336df282657888cdf564b895282b4dd0c146f233dd817369e55e48e94d694bfc5632ed7322a4bbb72f8682f2d70ac14ee33273c23622419066ebd486e3ea5ac1