Analysis

  • max time kernel
    150s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-06-2022 08:09

General

  • Target

    12ec1fe952f14a4d6a903ae4a84a5c14.exe

  • Size

    279KB

  • MD5

    12ec1fe952f14a4d6a903ae4a84a5c14

  • SHA1

    99569066968f6b7eac617720a7a6722214fb6f94

  • SHA256

    1b27224ec9506f0880abbf3876463efcf18c0060bfd2cdd697c538c07882acb5

  • SHA512

    024ddf7a1a2b691684feb1f3e1d14ff684a8dd135a8a36e5ede4f31283342d5926c89f05d73c94329b40bf95ffef56f8d9bc9140b30233921a952b1630de448e

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12ec1fe952f14a4d6a903ae4a84a5c14.exe
    "C:\Users\Admin\AppData\Local\Temp\12ec1fe952f14a4d6a903ae4a84a5c14.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:376

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/376-54-0x0000000000688000-0x0000000000699000-memory.dmp
    Filesize

    68KB

  • memory/376-55-0x00000000764C1000-0x00000000764C3000-memory.dmp
    Filesize

    8KB

  • memory/376-56-0x0000000000688000-0x0000000000699000-memory.dmp
    Filesize

    68KB

  • memory/376-57-0x0000000000220000-0x0000000000229000-memory.dmp
    Filesize

    36KB

  • memory/376-58-0x0000000000400000-0x00000000004EB000-memory.dmp
    Filesize

    940KB

  • memory/376-59-0x0000000000400000-0x00000000004EB000-memory.dmp
    Filesize

    940KB