Analysis
-
max time kernel
4294183s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
31-03-2022 14:50
Static task
static1
Behavioral task
behavioral1
Sample
f6b2c58f9846adcb295edd3c8a5beaec31fff3bc98f6503d04e95be3f9f072e8.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
f6b2c58f9846adcb295edd3c8a5beaec31fff3bc98f6503d04e95be3f9f072e8.exe
Resource
win10v2004-en-20220113
General
-
Target
f6b2c58f9846adcb295edd3c8a5beaec31fff3bc98f6503d04e95be3f9f072e8.exe
-
Size
24KB
-
MD5
c25b797d6737751936766cd50e26d725
-
SHA1
dfb3bfb53ce0430c8af1ee7b145408d63b1bec67
-
SHA256
f6b2c58f9846adcb295edd3c8a5beaec31fff3bc98f6503d04e95be3f9f072e8
-
SHA512
28871ab7d533a22d78545dd740df0c8b93ab0e9e0d81901faaf30d4656c953162ee1e049dcfbba0050405e7441eee77f056445653a8bd927963b8f81d9bf8eed
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
f6b2c58f9846adcb295edd3c8a5beaec31fff3bc98f6503d04e95be3f9f072e8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 f6b2c58f9846adcb295edd3c8a5beaec31fff3bc98f6503d04e95be3f9f072e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f6b2c58f9846adcb295edd3c8a5beaec31fff3bc98f6503d04e95be3f9f072e8.exe