Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-01-2023 06:01
Behavioral task
behavioral1
Sample
B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exe
Resource
win10v2004-20220812-en
General
-
Target
B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exe
-
Size
126KB
-
MD5
9a5b5d8a1ad102ee18e76e3aaba85f41
-
SHA1
0ff682447df5d56776a4af931fbc7e8d76ab686a
-
SHA256
b498478906628fecb57ccd1d01ac7f85d21e6335b63b81d4f3e5ec7666bbe211
-
SHA512
eb7871e7ba0a0e40f4b17e3661d46e915fde63a5d1692fdd878246657f10e20608614bd87392354083748f809a6af8627666d72086f50c2ea48bc3235c3d963c
-
SSDEEP
1536:+YcsdlmTsyBJ+TXZA9yxdVDEqdAipycFEyiGtWMGjx8j:+HsdlmTsyBsiybpUpc9TWrx8j
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exedescription pid process Token: SeDebugPrivilege 1364 B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exe