Analysis
-
max time kernel
205s -
max time network
241s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe
Resource
win10v2004-20221111-en
General
-
Target
b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe
-
Size
121KB
-
MD5
face0cc3370309983f1da4539d3fa72b
-
SHA1
7cfbb61b3aed4d6ed94a2e0cc39e55b438bc086e
-
SHA256
b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b
-
SHA512
1a06670b2fc667358e84116fe589bcf4ec121ef42c3f2cb0719d60cedf96abeed6a2575793cb1d04c864e4e3ea8223ba2be3e6cded2611b06d6c8cfa7d9ea8ce
-
SSDEEP
3072:RcCJ54LNfnPwv+DIm0J9MIcEkfVgd58h+5:R9J54LNfnPwI702E8Vgsg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2744 b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe"C:\Users\Admin\AppData\Local\Temp\b14292f6eed39b46acf526f0d4ac3e57fbf122242ecd0c90914eb953b78ed61b.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744