Analysis
-
max time kernel
41s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-02-2023 07:41
Static task
static1
Behavioral task
behavioral1
Sample
f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe
Resource
win10v2004-20221111-en
General
-
Target
f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe
-
Size
424KB
-
MD5
a7bb063860d29923fa8f2dff0cf90d5a
-
SHA1
7153e8c386c28b0736a61525b6b071d7148e9961
-
SHA256
f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109
-
SHA512
4fc9b7870bc220db7e94cb9db22bf1fb214ea65cb75937946081c0577cc66f9fcba63c954afc45f8b2e1c24602606e49a65b1eef8503b30535eed8cda412f828
-
SSDEEP
3072:3/82RgI4h46I/OpeNp3PC2wnwVLkJVllYPxk2dlHR:3nY4d/OpyCznLTllYl
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 892 f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe"C:\Users\Admin\AppData\Local\Temp\f3a662125d36c2bd4dec337b78864d25af624bcf9c069763dc57157bf6131109.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:892