Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 01:50
Static task
static1
Behavioral task
behavioral1
Sample
741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe
Resource
win10v2004-20220414-en
General
-
Target
741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe
-
Size
138KB
-
MD5
924b5216f581858cf223149da2273e0a
-
SHA1
05c859484e219e339a7b982725177aa44027c9a6
-
SHA256
741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec
-
SHA512
6a568362cf6b1fe7ec48ca5f27f1c9ace682f1755e5c6f06228efd907628bb1daf5e6b431adf77d990d68aa97f44c11ce45af74ce85198bdb1249d03999ae979
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exedescription pid process Token: SeDebugPrivilege 3112 741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe"C:\Users\Admin\AppData\Local\Temp\741e8c52db85376d5443147e247ee42141cf6920ec197ac71d7e43eee60bd9ec.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3112