Analysis
-
max time kernel
162s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:06
Behavioral task
behavioral1
Sample
f9f43346a9e2ba64c8611a4e5ec60ec2f4417f867447523654e2804b881ca412.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f9f43346a9e2ba64c8611a4e5ec60ec2f4417f867447523654e2804b881ca412.exe
Resource
win10v2004-20220812-en
General
-
Target
f9f43346a9e2ba64c8611a4e5ec60ec2f4417f867447523654e2804b881ca412.exe
-
Size
31KB
-
MD5
4a42b35b1d7d0f9262b960bc28d94302
-
SHA1
be4170a19c4fbb609186a1ffd6d9cdabf4321343
-
SHA256
f9f43346a9e2ba64c8611a4e5ec60ec2f4417f867447523654e2804b881ca412
-
SHA512
7ae4301c01e86278953258df36a7755e0542cb40f6f9f7ee62e19ca621cd508f619386cf619d16d82d70a48f18330e0f14fde5c4329ebc2c8ad8fb7b615f5273
-
SSDEEP
384:lUqwEFWfcZumSVlopYL64ZYLn1iO4fBNF0tw6gzPm16/EBl0GkZnYPLV4KYeM:lY0WUZu7VCK64ZY5iOLjgLfEYGs+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4268-132-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4268-133-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
f9f43346a9e2ba64c8611a4e5ec60ec2f4417f867447523654e2804b881ca412.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f9f43346a9e2ba64c8611a4e5ec60ec2f4417f867447523654e2804b881ca412.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f9f43346a9e2ba64c8611a4e5ec60ec2f4417f867447523654e2804b881ca412.exe