Analysis

  • max time kernel
    44s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-06-2022 13:57

General

  • Target

    4C05704586DC80ABE1F713418A12080F3AEF2038AFBD1.exe

  • Size

    16KB

  • MD5

    a2879e1fae655cc7c744f8fdce1291bc

  • SHA1

    be260996165a5b2a6a2d0b038ce7cd7ccaf0fb6f

  • SHA256

    4c05704586dc80abe1f713418a12080f3aef2038afbd124f01d08d44512d45c5

  • SHA512

    0400f2e8cb17bb09c87e1247c16a56c5be73c71eb58817a8c3bb02a20ac319fdedd2ce134af77c70ca184872b432a276b5f9cb06da782493fdfa59e6737e254f

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4C05704586DC80ABE1F713418A12080F3AEF2038AFBD1.exe
    "C:\Users\Admin\AppData\Local\Temp\4C05704586DC80ABE1F713418A12080F3AEF2038AFBD1.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-54-0x000007FEF3B20000-0x000007FEF4543000-memory.dmp
    Filesize

    10.1MB

  • memory/1068-55-0x000007FEF2840000-0x000007FEF38D6000-memory.dmp
    Filesize

    16.6MB