Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-07-2022 02:45
Static task
static1
Behavioral task
behavioral1
Sample
d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe
-
Size
321KB
-
MD5
d8392e4d42d9a1c91e08ba2ed4bdd3cc
-
SHA1
49db632eccf7593fb97f86457ee80876f9c0c89c
-
SHA256
7491a8a4866c578d50f6c0ae8addf97f40ecdf643d2c303b674dfe0dc36ebc13
-
SHA512
4bec5a61aeec62b41aff6ddce7e2b20dc48c28373d152d9844cc81a1621cfc44922b999b5c3e405e0cc49a5729f7a91a2bfa9a6f8c84a8b9d45d87d6dd72602a
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d8392e4d42d9a1c91e08ba2ed4bdd3cc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d8392e4d42d9a1c91e08ba2ed4bdd3cc.exepid process 1336 d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe 1336 d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
d8392e4d42d9a1c91e08ba2ed4bdd3cc.exepid process 1336 d8392e4d42d9a1c91e08ba2ed4bdd3cc.exe