Analysis
-
max time kernel
150s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-06-2022 08:09
Static task
static1
Behavioral task
behavioral1
Sample
12ec1fe952f14a4d6a903ae4a84a5c14.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
12ec1fe952f14a4d6a903ae4a84a5c14.exe
-
Size
279KB
-
MD5
12ec1fe952f14a4d6a903ae4a84a5c14
-
SHA1
99569066968f6b7eac617720a7a6722214fb6f94
-
SHA256
1b27224ec9506f0880abbf3876463efcf18c0060bfd2cdd697c538c07882acb5
-
SHA512
024ddf7a1a2b691684feb1f3e1d14ff684a8dd135a8a36e5ede4f31283342d5926c89f05d73c94329b40bf95ffef56f8d9bc9140b30233921a952b1630de448e
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
12ec1fe952f14a4d6a903ae4a84a5c14.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 12ec1fe952f14a4d6a903ae4a84a5c14.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 12ec1fe952f14a4d6a903ae4a84a5c14.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 12ec1fe952f14a4d6a903ae4a84a5c14.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
12ec1fe952f14a4d6a903ae4a84a5c14.exepid process 376 12ec1fe952f14a4d6a903ae4a84a5c14.exe 376 12ec1fe952f14a4d6a903ae4a84a5c14.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
12ec1fe952f14a4d6a903ae4a84a5c14.exepid process 376 12ec1fe952f14a4d6a903ae4a84a5c14.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/376-54-0x0000000000688000-0x0000000000699000-memory.dmpFilesize
68KB
-
memory/376-55-0x00000000764C1000-0x00000000764C3000-memory.dmpFilesize
8KB
-
memory/376-56-0x0000000000688000-0x0000000000699000-memory.dmpFilesize
68KB
-
memory/376-57-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/376-58-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/376-59-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB