Analysis
-
max time kernel
135s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:01
Static task
static1
Behavioral task
behavioral1
Sample
b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe
Resource
win10v2004-20221111-en
General
-
Target
b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe
-
Size
80KB
-
MD5
6e533f5fdfded62bc031d417328c0def
-
SHA1
a80c1454f8482e4d59f977dabdc998fd0c342ce2
-
SHA256
b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997
-
SHA512
7693ef172c78d840ae599e2864281c9a3c56e88159c7899e3fc2ae2799c8a0f88bb14e4320e3e74d106beb10d88cfb150d8dcc0bce6b17cfe22e9e2c3c7c006a
-
SSDEEP
768:Vi9LM4MGvX29MWVzxC8nYDMIc2Avbrn9NUNyHlfvHJ5QfnknvxeUrxXupp7eegXc:VKM4MNVzZh2AvPiyHlnXvoUrE71JtR
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exepid process 1012 b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe 1012 b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exepid process 1012 b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe"C:\Users\Admin\AppData\Local\Temp\b1ee7ae267d90a654ee7dc23cab0d8ac5402905abf05579ab8c80b439ba6d997.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1012