Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 17:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
POS_C163.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
POS_C163.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
POS_C163.exe
-
Size
3.0MB
-
MD5
13bf7aa11fc7275ee65099621f0dc652
-
SHA1
e3a5b65d6ebd4438ce224e72d4a7abe507af76e3
-
SHA256
966578e19ce42abed04edb6a63373337af14ca61c1f12a9a6255852b2cabdee6
-
SHA512
44a29098d89fdea883525e0d94954e260868005ab8abfdf198b824d221dd6b3d1d91c719fa2f9161cfb387f8c7155216899492123cf2696280b3400733e6d322
-
SSDEEP
98304:BCJt6NCueDO1mjQ1SqzwQAFjjdjjA/YiY0Y0Y0Y0YI:U2d18Q1SqzwQAFjjdjjA/YiY0Y0Y0Y01
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 POS_C163.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POS_C163.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2900 POS_C163.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 POS_C163.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 POS_C163.exe