Analysis

  • max time kernel
    205s
  • max time network
    241s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 17:37

General

  • Target

    b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe

  • Size

    121KB

  • MD5

    face0cc3370309983f1da4539d3fa72b

  • SHA1

    7cfbb61b3aed4d6ed94a2e0cc39e55b438bc086e

  • SHA256

    b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b

  • SHA512

    1a06670b2fc667358e84116fe589bcf4ec121ef42c3f2cb0719d60cedf96abeed6a2575793cb1d04c864e4e3ea8223ba2be3e6cded2611b06d6c8cfa7d9ea8ce

  • SSDEEP

    3072:RcCJ54LNfnPwv+DIm0J9MIcEkfVgd58h+5:R9J54LNfnPwI702E8Vgsg

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe
    "C:\Users\Admin\AppData\Local\Temp\b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2744

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads