Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 14:30

General

  • Target

    40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe

  • Size

    236KB

  • MD5

    1b4bb57ddc3b95528194fabaf01ac054

  • SHA1

    d43099bcf31d5a9e9fb0cec6b624ed7c722486a4

  • SHA256

    40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb

  • SHA512

    17fd778588b264fee527a05ad994293871783c02e6b2d34197b45697d5e02dc9655b475ade8debeed6430833844a20f9c48eb0f1a397a099d027b56b9ea082e2

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe
    "C:\Users\Admin\AppData\Local\Temp\40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe"
    1⤵
    • Checks BIOS information in registry
    PID:2544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2544-130-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2544-131-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2544-132-0x00000000022A0000-0x00000000022C0000-memory.dmp

    Filesize

    128KB