Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 13:22

General

  • Target

    19d49aba679c6ec0edcee29a1ac3d7a7.exe

  • Size

    35KB

  • MD5

    19d49aba679c6ec0edcee29a1ac3d7a7

  • SHA1

    ae189a9fa46e0e15d33ba07e5aaa3446659f7a72

  • SHA256

    e5383331a3f9d63ee0983578fa2cb8b7e6380921495169b1678986b0cb540e64

  • SHA512

    412b16bf244cda7b2c1a711e1c39c7b4679462bc665517d829674f623411efc7e135f4cf3e2e60898f8f3e70fd3f92de041b4349896dca869520ee0e9de36765

  • SSDEEP

    768:hKG/QKao3v/rNDGlWDTjt9WZ4ociomousngtbnPfIZfaS7XNOxX2eWxddeV:8G/dXxDGlWvjtqFcesngFIZa/x2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\19d49aba679c6ec0edcee29a1ac3d7a7.exe
    "C:\Users\Admin\AppData\Local\Temp\19d49aba679c6ec0edcee29a1ac3d7a7.exe"
    1⤵
    • Checks processor information in registry
    PID:2892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2892-0-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB