Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2022 10:02

General

  • Target

    FD775CDB2DC7C7FE6315E06DA2E80FA20A68ADFE084DB.exe

  • Size

    14KB

  • MD5

    67851d8e6943803579fb1d945c26bc50

  • SHA1

    1d90361a821965f7c00320143eaf005aa6cbf939

  • SHA256

    fd775cdb2dc7c7fe6315e06da2e80fa20a68adfe084dbf62ac0f0a2c7f7b7313

  • SHA512

    c9a16d33e9dcc17d60ae3d5bcf91092b70c2c76542ce3a4364ea917eb1585de5d2357bfffe42f1809f28bc401698f82e94cdab1fe2ea0a3d88cd01f0a7a194d3

  • SSDEEP

    192:V+8C+EKS0O9ejYTDG8bcp4LlRKnieXubWyD9JEBkGxVX0qoNRRJw:VNVjYTDG8gp8ReXTyD3EnxPoNS

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FD775CDB2DC7C7FE6315E06DA2E80FA20A68ADFE084DB.exe
    "C:\Users\Admin\AppData\Local\Temp\FD775CDB2DC7C7FE6315E06DA2E80FA20A68ADFE084DB.exe"
    1⤵
    • Checks processor information in registry
    PID:1164

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1164-135-0x00000000750E0000-0x0000000075691000-memory.dmp
    Filesize

    5.7MB

  • memory/1164-136-0x00000000750E0000-0x0000000075691000-memory.dmp
    Filesize

    5.7MB