Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2023 20:07

General

  • Target

    bRZe.exe

  • Size

    14KB

  • MD5

    44cdabc186e152a184a431e594d4345d

  • SHA1

    d4a243dec68f05e972a7ac73111545d42ab5d9b6

  • SHA256

    6ceec6de713d24950e651cddb2ad1c6103e392160623a94a62f9b42f77c58d86

  • SHA512

    080ce2a3b39fa84e0ac1c6c68df61c3334b2277fc0938bd670f460cad4c91b183d3d14008da90543c466cb39e9f5407937a34449a106018abad56632fdacdb58

  • SSDEEP

    192:K+8C+EKS0O9ejYTDG8bcp4LlzKnieXubWyD9JEBkGxVXfqoNJRJw:KNVjYTDG8gpaReXTyD3EnxMoN6

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bRZe.exe
    "C:\Users\Admin\AppData\Local\Temp\bRZe.exe"
    1⤵
    • Checks processor information in registry
    PID:1672

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-0-0x0000000074A70000-0x000000007501B000-memory.dmp
    Filesize

    5.7MB

  • memory/1672-1-0x0000000074A70000-0x000000007501B000-memory.dmp
    Filesize

    5.7MB

  • memory/1672-2-0x00000000005B0000-0x00000000005F0000-memory.dmp
    Filesize

    256KB

  • memory/1672-3-0x0000000074A70000-0x000000007501B000-memory.dmp
    Filesize

    5.7MB

  • memory/1672-4-0x0000000074A70000-0x000000007501B000-memory.dmp
    Filesize

    5.7MB

  • memory/1672-5-0x00000000005B0000-0x00000000005F0000-memory.dmp
    Filesize

    256KB