Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 13:00

General

  • Target

    94ffc3c311c64381ad65841a4d53de2f.exe

  • Size

    91KB

  • MD5

    94ffc3c311c64381ad65841a4d53de2f

  • SHA1

    30b156ade9a3cbeb7c7c40d445401be2df1d5d51

  • SHA256

    c19f389ef8e26afd7cae3b38355fe5525d73f81619e05c64bff1d6d04c136a3e

  • SHA512

    b791531155344e1fca45264aa4ed96c4cf39e7800d4bbd2607dc3cfe47c02fe5ff83f2cc50967f75e1142967b06f8619f5fd71e60b383605be0cb402403af82a

  • SSDEEP

    1536:IuhHbpT5Tg0/DiZ8obysUCB8Zf0I77j06cL/WGAamXhE:IuhHbhq0/D+ysUCA0I77j06k1AamXh

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\94ffc3c311c64381ad65841a4d53de2f.exe
    "C:\Users\Admin\AppData\Local\Temp\94ffc3c311c64381ad65841a4d53de2f.exe"
    1⤵
    • Checks processor information in registry
    PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1884-0-0x0000000001000000-0x0000000001017000-memory.dmp

    Filesize

    92KB

  • memory/1884-2-0x0000000001000000-0x0000000001017000-memory.dmp

    Filesize

    92KB