Analysis
-
max time kernel
171s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:31
Static task
static1
Behavioral task
behavioral1
Sample
837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60.exe
Resource
win10v2004-20220414-en
General
-
Target
837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60.exe
-
Size
79KB
-
MD5
0b369c7fdfa16a96389d53a38364940a
-
SHA1
cc0121e4281ea5d2d23a461e1d361b0ab3256bdd
-
SHA256
837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60
-
SHA512
c10a447c5fab63fd6ae9c9e0c2ff10972205d459e266efe295bce784f319c2e90f8e53104d11852e2f412f5646d6fa0fcfe63c4652f161a1b4c4b84067b3afb4
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CentralProcessor\0 837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 837206a431975e0ce8c5d1882dfffa53b7f59c5cef0524072cf52bd0e9e49d60.exe