Analysis

  • max time kernel
    170s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-06-2022 14:12

General

  • Target

    7zS8A52FD1B/62a1ea2501f48_0371f5.exe

  • Size

    173KB

  • MD5

    72968341a0de08313bc9ab626d212f91

  • SHA1

    f893e4510e600ff3b6d33cea85571fa26c270606

  • SHA256

    ef9863d5358896238ef682130b38511033fd9f14354263326dd000b39358c4b4

  • SHA512

    1fe2a7a5fc1e32d4a581efd8148b66525adf3249c02fe3811b24f620c1e3c8af926cabca5ad07d59740e6480a0cb3833db87cc2354ac22cbade57924eaff6346

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2501f48_0371f5.exe
    "C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2501f48_0371f5.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3792

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3792-130-0x00000000009BD000-0x00000000009C6000-memory.dmp
    Filesize

    36KB

  • memory/3792-131-0x0000000000970000-0x0000000000979000-memory.dmp
    Filesize

    36KB

  • memory/3792-132-0x0000000000400000-0x00000000008F5000-memory.dmp
    Filesize

    5.0MB

  • memory/3792-133-0x0000000000400000-0x00000000008F5000-memory.dmp
    Filesize

    5.0MB