Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe
Resource
win10v2004-20240704-en
General
-
Target
7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe
-
Size
5.7MB
-
MD5
278fdb7269bcaeb148f6707c7ce3d869
-
SHA1
b7028031b8e1fb8aa194c515b314c4d9e05718e5
-
SHA256
7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f
-
SHA512
92e69cd2b36995f00475e44c6fad92ca2ffe75c74fd2734a766a97325fc80f57094fb9190d6f98cc0ba845d145177717cce2bf1c58c81d808a0fa3bb053470ec
-
SSDEEP
98304:b/6n94bDY2EBcBuq62V///4nAWakrn7S/IhWoaVVfs/VIsMF4JD8iulhq7NmGkVu:uMD+cpvJ/4H3nmghWoa/fsysMF4JD85Q
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe Token: SeShutdownPrivilege 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe Token: SeShutdownPrivilege 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe Token: SeShutdownPrivilege 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2948 7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe"C:\Users\Admin\AppData\Local\Temp\7076ad70211d1ef3b2d2043d6a7091afec4e57f6d9cb32e4a006786b72c1010f.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652B
MD52c4d948fcd580b6c0a2f12e396cb77ed
SHA1d0232019dc78ad446422a95495772a46a1f9a8a6
SHA2568d774452ece69d737c58c394e53ec732d7ea1f4c3000c871d5bfb09a53164724
SHA5123bef79da9baefd56d8a74fcfabd449fc03e895dbac581d293eca4fa55833c2d5022897f1032a447cbc1c3d02b4fad3a772a2fb01b32ea4da62a750dee6979742
-
Filesize
3KB
MD5f458d0c2a0e0999eaf66801624273a9f
SHA1d3a2f6e1203099995be1491e23c79e264d3d71e4
SHA256ecff928cd5b267697a354e7f2fc8d84be449671141de799082f65a64da7f347c
SHA512e3b9ff9a6fdb44f0b3785455f5815af7c88bd9d1ce9433c1acbf41464d88b4368bc1b6fe9ea374c4481c6011434261098ecb9f242d3a1f9159958ca12af1fd7f
-
Filesize
12KB
MD5519514f4e70c24e0826cdbfbe89c2540
SHA1c711b5606e841d3989cd26296e6bee2896a743a3
SHA2565e9b88ac5a5209a55a9887cc3f746476b1717d093fe2d9c0c8abb6d9e300ac93
SHA512c4f8de69047e52f5345d82b3e4be485cc3d1bb8b3b692160494c4bf3de1a277e55b9d0ca0717849b878d3e73e01066a3c2be1255dc07b357cf3b152674c5fb3d
-
Filesize
206B
MD5b4bb6d8d0e0d8143fa188bf4ee956ec8
SHA1045d956d20d34b16e157591ee2121a9a854fb506
SHA256aef6e55cac1f0e2181b525ae29500e2df5c40bed4f792b8f0136320ebe85b17a
SHA5122f10fe8cede3b5556f624a4a8d88bf408d0ef03a4f0789b597ebafd39f220840d39baa16259f351f5d0ec7484325e62b43546de5ca12c5f36b0f98a33136c16a