Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
c1e6b2a84838945061845bb58af668a4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c1e6b2a84838945061845bb58af668a4.exe
Resource
win10v2004-20240226-en
General
-
Target
c1e6b2a84838945061845bb58af668a4.exe
-
Size
350KB
-
MD5
c1e6b2a84838945061845bb58af668a4
-
SHA1
1e25a463627bcdf5a997f35878ea53ca79b06a36
-
SHA256
988c29efb4f60f858378ce1592aeb51840228a5023a92b701a37633521d2fa90
-
SHA512
055ea19729a3d5d2bc03ba0ce23f8661e1010e50b0e3feecf6a2b90d5b010f767bf410aec7c846ecb99f3503f26e4e1959ad62ac86a149012f86735e1481e495
-
SSDEEP
6144:q8jUca5+gfpUOivRX9N79en584eeDXrGMUDMnYArVRkT0rWNun1z:q8Yco+gunv179en24e8GMUWwT8Wcn1z
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c1e6b2a84838945061845bb58af668a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c1e6b2a84838945061845bb58af668a4.exe