Analysis
-
max time kernel
133s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
03efb2590b5937d90bfc602b80d81788e7ecfa989934951f51d661626ab352d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03efb2590b5937d90bfc602b80d81788e7ecfa989934951f51d661626ab352d1.exe
Resource
win10v2004-20220812-en
General
-
Target
03efb2590b5937d90bfc602b80d81788e7ecfa989934951f51d661626ab352d1.exe
-
Size
72KB
-
MD5
6968eacf455d4e95f2d5070c7b1c4950
-
SHA1
5e2200f2861170270eeefad7e16e056a56206d06
-
SHA256
03efb2590b5937d90bfc602b80d81788e7ecfa989934951f51d661626ab352d1
-
SHA512
a2f111b99672a147839bda374f76cf9ae4e15e6130d03ef7560125d6818b42ef523e8272d8cbc0edd0072053793f566bee80e36d46da1437fde0da04a503dde5
-
SSDEEP
768:18YszetTYzwit3NWpn20yHav3TWlBdsOdZnShsHBuqPTN//0qht6MR:18YsKYzN3NY2G3TW/KOdhKnqZ/XtNR
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pc.exe 03efb2590b5937d90bfc602b80d81788e7ecfa989934951f51d661626ab352d1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 03efb2590b5937d90bfc602b80d81788e7ecfa989934951f51d661626ab352d1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 03efb2590b5937d90bfc602b80d81788e7ecfa989934951f51d661626ab352d1.exe