Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2023 20:08

General

  • Target

    bRZe.exe

  • Size

    14KB

  • MD5

    44cdabc186e152a184a431e594d4345d

  • SHA1

    d4a243dec68f05e972a7ac73111545d42ab5d9b6

  • SHA256

    6ceec6de713d24950e651cddb2ad1c6103e392160623a94a62f9b42f77c58d86

  • SHA512

    080ce2a3b39fa84e0ac1c6c68df61c3334b2277fc0938bd670f460cad4c91b183d3d14008da90543c466cb39e9f5407937a34449a106018abad56632fdacdb58

  • SSDEEP

    192:K+8C+EKS0O9ejYTDG8bcp4LlzKnieXubWyD9JEBkGxVXfqoNJRJw:KNVjYTDG8gpaReXTyD3EnxMoN6

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bRZe.exe
    "C:\Users\Admin\AppData\Local\Temp\bRZe.exe"
    1⤵
    • Checks processor information in registry
    PID:1564

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1564-0-0x0000000074A90000-0x0000000075041000-memory.dmp
    Filesize

    5.7MB

  • memory/1564-1-0x0000000074A90000-0x0000000075041000-memory.dmp
    Filesize

    5.7MB

  • memory/1564-2-0x0000000000DE0000-0x0000000000DF0000-memory.dmp
    Filesize

    64KB

  • memory/1564-3-0x0000000074A90000-0x0000000075041000-memory.dmp
    Filesize

    5.7MB