Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 23:26

General

  • Target

    206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe

  • Size

    5.7MB

  • MD5

    97619e785622c48db4448be58e19e4b9

  • SHA1

    04872bc353250cbb7fbdbc2f1b43cd5202bb6137

  • SHA256

    206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e

  • SHA512

    f91006e96d3179c8c824e2bea0fc3617044b03ace020fe71a2426ba2b0cd5fa782a0a20486d117f9fec037ea35da4268aeeb7ac808cf44699491cea10dd818f1

  • SSDEEP

    98304:b/6n94bDY2EBcBuq62V///4nAWakrn7S/IhWoaVVfs/VIsMF4JD8iulhq7Nm+kVG:uMD+cpvJ/4H3nmghWoa/fsysMF4JD85c

Score
9/10

Malware Config

Signatures

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe
    "C:\Users\Admin\AppData\Local\Temp\206476bbbb7a5ef315e421a6afa280b68a7473de5101de2ccf0a60e19a93044e.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1688
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3240,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=4048 /prefetch:8
    1⤵
      PID:4912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\yjs_log\log.log

      Filesize

      779B

      MD5

      396828d8ac7182fa54f6ff8225c59e61

      SHA1

      dd6f86f95133fc2bfd73f549cf6e1a734cbeaa97

      SHA256

      0f60502cfbc0ca323e1afbf1d7d98a7fb6e6080b3e2bd39d7c7cb6f0d5611dfb

      SHA512

      8918a615824e768979420142e13d9539733eedc9071053b6b85441cf6e3c7899384e2eee87c94743c6bea5e949ac1fc28e7bcc9a195cbc612d32d516ee35d459

    • C:\Users\Admin\AppData\Local\Temp\yjs_log\log.log

      Filesize

      308B

      MD5

      de88e19cad3b8796df9aa6ffc6f0b47f

      SHA1

      21b1a86b3478abc957826439c65d23736d4ac800

      SHA256

      9eeeefb7016e6823561e51efeed94676c0da4870fd477651f7e9abfb9409956d

      SHA512

      9692970835115a48611a2b48ab631cdc6f9df99e692f3f5de6d722db3ca74e2b891eaa1a9babe86de07e9e6742677186b569b5327af4201f1e257dc337cd0bd9

    • C:\Users\Admin\AppData\Local\Temp\yjs_log\log.log

      Filesize

      4KB

      MD5

      aa98545da781123b8d1a8ccc238617e7

      SHA1

      e78219892ae046c343f5858c0638ad155380146a

      SHA256

      218d8e15323ceba3cb18a61a87a9911785e04ad0cf957dc3f55a928632178b4e

      SHA512

      336df282657888cdf564b895282b4dd0c146f233dd817369e55e48e94d694bfc5632ed7322a4bbb72f8682f2d70ac14ee33273c23622419066ebd486e3ea5ac1