Analysis

  • max time kernel
    94s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 14:24

General

  • Target

    output.exe

  • Size

    41KB

  • MD5

    7d65249804f8c4475ac8a5b3ba75410d

  • SHA1

    9a8ae77352022bf3b624fbaa12f5e119efff18a0

  • SHA256

    2e1aaca7fe166e5b90e216a0f60166e1f50bf62a852facb3e553629180435c76

  • SHA512

    ed9f3798c1bdb3f980a20ed064b0f79957ce0ccb21d770ef1ef2483bbf45fe15972e9af0c966980c53c4d4f1c10f8cadcaa452ba26b501aa364c1bcdf8977c0b

  • SSDEEP

    768:UscoSf3GMXfT6axpDXswguZkeQWTjxKZKfgm3EhFq:7coSfnxEeQWTlF7EHq

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\output.exe
    "C:\Users\Admin\AppData\Local\Temp\output.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4484-1-0x00007FFB946F3000-0x00007FFB946F5000-memory.dmp

    Filesize

    8KB

  • memory/4484-0-0x0000000000620000-0x0000000000630000-memory.dmp

    Filesize

    64KB

  • memory/4484-2-0x00007FFB946F0000-0x00007FFB951B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4484-3-0x00007FFB946F3000-0x00007FFB946F5000-memory.dmp

    Filesize

    8KB

  • memory/4484-7-0x00007FFB946F0000-0x00007FFB951B1000-memory.dmp

    Filesize

    10.8MB