Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 14:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
871304969b0f2c548bc596f82647609d.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
871304969b0f2c548bc596f82647609d.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
871304969b0f2c548bc596f82647609d.exe
-
Size
588KB
-
MD5
871304969b0f2c548bc596f82647609d
-
SHA1
d05a71060a774be05d171367b60b5663504f593d
-
SHA256
643c2aa2e9f626af4734c65b4ea5dd7ecedde318c27a47fa3a2448847b7e99ba
-
SHA512
9c276d5359b36eec979450497692eafdf99ddd2d87b24fad8a19147adc1f3d870d2641c8ad3de4d65a89e59d475cd3afe3d8b8a9622e1f69a137fe003d1aff3d
-
SSDEEP
12288:SYpjOo7QY0E9KFu8ok5PVefbPmq1YRYGK000b9JDEzlGswoOX:SgOoEFnVV0bPTqkv0OM
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 iplogger.org 19 iplogger.org -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 871304969b0f2c548bc596f82647609d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 871304969b0f2c548bc596f82647609d.exe