Analysis

  • max time kernel
    51s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 16:08

General

  • Target

    51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe

  • Size

    549KB

  • MD5

    26f3795939222018a28e1b608d877050

  • SHA1

    05b5201150fc7fd14a0da8e2fc5bd044d5253cfd

  • SHA256

    51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010

  • SHA512

    b639f271ae18c241fd97a5ae304aad9947cc4a420878062d449e28782594e30a4194cf6a116ee766fc444bd884c7ab93132aa6be55b29218d0d11f7ed78a4c9d

  • SSDEEP

    12288:Lu/0orFvVXAMwo6ooGamQR9qL66WvoMzlTTXb/dp:LLob87LmW9q26YbTX7j

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe
    "C:\Users\Admin\AppData\Local\Temp\51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:1448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1448-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB