Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2023, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe
Resource
win10v2004-20230221-en
General
-
Target
8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe
-
Size
912KB
-
MD5
f46c45842df04a632b715c8f54a63189
-
SHA1
60e0073865e66c95781f1c940e77b22f98668f29
-
SHA256
8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7
-
SHA512
1703d34866a30eb08e7bc03924314e58e7648280ed4664ae1a784032526ed70a4db5b600676a39d3cf5cd5fce2848743863e5fdd7b8c6eb77a66545913d2a78d
-
SSDEEP
12288:pLgS5A5QkPwmqD2rnj6+HN2ojwAKJEBHQFphlrvnN:wgmqD2r2GNGvIahlrvnN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 616 8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe"C:\Users\Admin\AppData\Local\Temp\8f3663af926fc4e0b48e6eb0b6244b486d66fb0bc260c6fadcf8f279c0da8dc7.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:616