Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:13
Behavioral task
behavioral1
Sample
22a40f4a667234aef2c45cf227a95793.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
22a40f4a667234aef2c45cf227a95793.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
22a40f4a667234aef2c45cf227a95793.exe
-
Size
353KB
-
MD5
22a40f4a667234aef2c45cf227a95793
-
SHA1
440c2491a5bce561b4988829f76114f6152ca27e
-
SHA256
3436474b6b8dd47cc8735b923f4cb8c4c5d6a7b9c9be628c5661d4e094c18230
-
SHA512
86ae3a6644185a1318af906f92b2b569e39a9ccd049e2b9e158ecbc1607842c4279a0633b1b7b484c6376bc2a442d958306d92fa37cc74ff22c51d31e99d97f7
-
SSDEEP
6144:qlOUsKkG15O4K7faLJ8aZdCFnoJ23pCQUo7sRm+e4lI0X6JaX2llChnkU08uuMDD:qlOUdb+4qid8wvo7X+Zm+hna8mtx
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\hardware\description\system\centralprocessor\0 22a40f4a667234aef2c45cf227a95793.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 22a40f4a667234aef2c45cf227a95793.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 22a40f4a667234aef2c45cf227a95793.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1152 22a40f4a667234aef2c45cf227a95793.exe