Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 04:49
Static task
static1
Behavioral task
behavioral1
Sample
a035c97a6615a8b045b2ecd7f30f1aac70d58d432c84f4616faeea49ea5a4ba7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a035c97a6615a8b045b2ecd7f30f1aac70d58d432c84f4616faeea49ea5a4ba7.exe
Resource
win10v2004-en-20220112
General
-
Target
a035c97a6615a8b045b2ecd7f30f1aac70d58d432c84f4616faeea49ea5a4ba7.exe
-
Size
14KB
-
MD5
7bfbed1eee53ab737d2e3eaa0ee63896
-
SHA1
72f31b3a036798cdfc90ef57914b46f6b25cbb72
-
SHA256
a035c97a6615a8b045b2ecd7f30f1aac70d58d432c84f4616faeea49ea5a4ba7
-
SHA512
d6f882c5a78afa240cc0dce9a52ba30d15ab96c0114409d06c44c58436ead6da78ac9842af0d61e68829c6ed32e65ad9fbc59bf0dbee163118b68340a7ef2b69
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
a035c97a6615a8b045b2ecd7f30f1aac70d58d432c84f4616faeea49ea5a4ba7.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 a035c97a6615a8b045b2ecd7f30f1aac70d58d432c84f4616faeea49ea5a4ba7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a035c97a6615a8b045b2ecd7f30f1aac70d58d432c84f4616faeea49ea5a4ba7.exe