Analysis
-
max time kernel
86s -
max time network
110s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 23:46
Static task
static1
Behavioral task
behavioral1
Sample
8e356460fb362d1ffa139a35a6b3c54e24b878003dbe1ea6849b26cc1de1f96c.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
8e356460fb362d1ffa139a35a6b3c54e24b878003dbe1ea6849b26cc1de1f96c.exe
-
Size
533KB
-
MD5
970f402d9ac42b17c150d4b70d501870
-
SHA1
1086fa8d8aa01cbc8784904960bd3fa06a0c0cee
-
SHA256
8e356460fb362d1ffa139a35a6b3c54e24b878003dbe1ea6849b26cc1de1f96c
-
SHA512
f6b4c579a84aacf5ea0826a2892f2b95ae4d6f7218aa25177e1ca7eaaf52497e8edc48ac3dc922b4d4e563c76d5846ecf74c5f72ebe2dfb37b15131cd79e8900
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
8e356460fb362d1ffa139a35a6b3c54e24b878003dbe1ea6849b26cc1de1f96c.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8e356460fb362d1ffa139a35a6b3c54e24b878003dbe1ea6849b26cc1de1f96c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8e356460fb362d1ffa139a35a6b3c54e24b878003dbe1ea6849b26cc1de1f96c.exe