Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 13:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
11102023_1839_drkgate_1110.exe
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
11102023_1839_drkgate_1110.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
11102023_1839_drkgate_1110.exe
-
Size
388KB
-
MD5
7ed92cbc082874cc7a4807f67244e85b
-
SHA1
a592a39b1850e08c7956e2ffc9d1c0875e805c8c
-
SHA256
dda5e4889f9adbd0733558ea72934f65944f748fe77c06f9fcbbadbc0ac0b66b
-
SHA512
c52f3fd75dd0cd129012fef6c473ee42d23a1b4ac18cdcebe35e41d8b62cda2c4c338b55532523b6196f4e97ad062b2082605e80fc05c70cf26f110fdc16682c
-
SSDEEP
6144:s50tl7kAfri5ZhtWtIv9n0YQFaVfTnU6UVtm+aq1nMyCCvgT2Pt:a0tlBi5ZhtWtIv50genn91n1CCvj
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 11102023_1839_drkgate_1110.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 11102023_1839_drkgate_1110.exe