Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-07-2022 14:30

General

  • Target

    40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe

  • Size

    236KB

  • MD5

    1b4bb57ddc3b95528194fabaf01ac054

  • SHA1

    d43099bcf31d5a9e9fb0cec6b624ed7c722486a4

  • SHA256

    40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb

  • SHA512

    17fd778588b264fee527a05ad994293871783c02e6b2d34197b45697d5e02dc9655b475ade8debeed6430833844a20f9c48eb0f1a397a099d027b56b9ea082e2

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe
    "C:\Users\Admin\AppData\Local\Temp\40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe"
    1⤵
    • Checks BIOS information in registry
    PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1784-54-0x0000000074C81000-0x0000000074C83000-memory.dmp

    Filesize

    8KB

  • memory/1784-55-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1784-56-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1784-57-0x00000000003E0000-0x0000000000400000-memory.dmp

    Filesize

    128KB