Overview
overview
10Static
static
10a6b7e1f8d9...13.exe
windows7-x64
10a6b7e1f8d9...13.exe
windows10-2004-x64
10a6d91e550d...6e.exe
windows7-x64
7a6d91e550d...6e.exe
windows10-2004-x64
7a72cdbd8e2...ad.exe
windows7-x64
10a72cdbd8e2...ad.exe
windows10-2004-x64
10a731427f52...04.exe
windows7-x64
6a731427f52...04.exe
windows10-2004-x64
6a73951d873...67.exe
windows7-x64
10a73951d873...67.exe
windows10-2004-x64
10a74be4d5e7...73.exe
windows7-x64
10a74be4d5e7...73.exe
windows10-2004-x64
10a77ff4e4dd...87.exe
windows7-x64
10a77ff4e4dd...87.exe
windows10-2004-x64
10a799e456ff...88.exe
windows7-x64
10a799e456ff...88.exe
windows10-2004-x64
10a7c49036eb...95.exe
windows7-x64
3a7c49036eb...95.exe
windows10-2004-x64
3a7d8553ba6...a8.exe
windows7-x64
7a7d8553ba6...a8.exe
windows10-2004-x64
7a7e953c880...28.exe
windows7-x64
10a7e953c880...28.exe
windows10-2004-x64
10a7ead69ceb...a3.exe
windows7-x64
9a7ead69ceb...a3.exe
windows10-2004-x64
9a7ec6d64b2...db.exe
windows7-x64
1a7ec6d64b2...db.exe
windows10-2004-x64
1a7fd5ae1f0...f8.exe
windows7-x64
10a7fd5ae1f0...f8.exe
windows10-2004-x64
10a884e586e0...e0.exe
windows7-x64
10a884e586e0...e0.exe
windows10-2004-x64
10a8b0399c70...33.exe
windows7-x64
10a8b0399c70...33.exe
windows10-2004-x64
10Analysis
-
max time kernel
123s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win10v2004-20250314-en
General
-
Target
a7ead69cebb4805f528bc566a9b4eea3.exe
-
Size
2.3MB
-
MD5
a7ead69cebb4805f528bc566a9b4eea3
-
SHA1
8a2c748c16e5ce838877410c83b1cedb7e62e17f
-
SHA256
7736c501dd6d579e29c5b75abdb0b3d5041704a7ddeae146805ebc470efd406f
-
SHA512
49ab87faf90bcfc04605225147e3445b22be2f1f27de8c201152c1cd5185768499d26acf9192b718fec46d04192b9e57e085a6e527e62f3887135228b4520762
-
SSDEEP
49152:Ehyj2PC/eL39+BnEeIumypL6aau2F7katWqaRER0vNgt:sQep6Epq6/rewkQ
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions a7ead69cebb4805f528bc566a9b4eea3.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools a7ead69cebb4805f528bc566a9b4eea3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a7ead69cebb4805f528bc566a9b4eea3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a7ead69cebb4805f528bc566a9b4eea3.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a7ead69cebb4805f528bc566a9b4eea3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a7ead69cebb4805f528bc566a9b4eea3.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7ead69cebb4805f528bc566a9b4eea3.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe 3608 a7ead69cebb4805f528bc566a9b4eea3.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: SeIncBasePriorityPrivilege 3608 a7ead69cebb4805f528bc566a9b4eea3.exe Token: 33 3608 a7ead69cebb4805f528bc566a9b4eea3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ead69cebb4805f528bc566a9b4eea3.exe"C:\Users\Admin\AppData\Local\Temp\a7ead69cebb4805f528bc566a9b4eea3.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608