Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 16:32
Static task
static1
Behavioral task
behavioral1
Sample
05e6b223972ea45cabb0c4502f640cd6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05e6b223972ea45cabb0c4502f640cd6.exe
Resource
win10v2004-20231215-en
General
-
Target
05e6b223972ea45cabb0c4502f640cd6.exe
-
Size
1.5MB
-
MD5
05e6b223972ea45cabb0c4502f640cd6
-
SHA1
84ceba43cce6961385458f62e5c426d03898e90d
-
SHA256
e35af839ea3a134ac18e28d48f2a7b414a4db10894a633e6ade6d5b8062ada88
-
SHA512
14194e974acbaae5be74f29f4f703fc737b04c62ba0db87216abc2e23977f29bc4b2dc1739d10bf6bfae51cb7bca09fff83e5fb967ad383204b76d2b7a077985
-
SSDEEP
24576:hG5EOH+E7BGX6kxS1K9WzYpqXmSL4FEdQpYM2sVn69izHvIR0rRzUPHY9o:hG5EpHMK9WyemSL4FGQueV6QHKSI
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2332 05e6b223972ea45cabb0c4502f640cd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 05e6b223972ea45cabb0c4502f640cd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 05e6b223972ea45cabb0c4502f640cd6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 05e6b223972ea45cabb0c4502f640cd6.exe 2332 05e6b223972ea45cabb0c4502f640cd6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 05e6b223972ea45cabb0c4502f640cd6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2332 05e6b223972ea45cabb0c4502f640cd6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e6b223972ea45cabb0c4502f640cd6.exe"C:\Users\Admin\AppData\Local\Temp\05e6b223972ea45cabb0c4502f640cd6.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332