Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
c1e6b2a84838945061845bb58af668a4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c1e6b2a84838945061845bb58af668a4.exe
Resource
win10v2004-20240226-en
General
-
Target
c1e6b2a84838945061845bb58af668a4.exe
-
Size
350KB
-
MD5
c1e6b2a84838945061845bb58af668a4
-
SHA1
1e25a463627bcdf5a997f35878ea53ca79b06a36
-
SHA256
988c29efb4f60f858378ce1592aeb51840228a5023a92b701a37633521d2fa90
-
SHA512
055ea19729a3d5d2bc03ba0ce23f8661e1010e50b0e3feecf6a2b90d5b010f767bf410aec7c846ecb99f3503f26e4e1959ad62ac86a149012f86735e1481e495
-
SSDEEP
6144:q8jUca5+gfpUOivRX9N79en584eeDXrGMUDMnYArVRkT0rWNun1z:q8Yco+gunv179en24e8GMUWwT8Wcn1z
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c1e6b2a84838945061845bb58af668a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c1e6b2a84838945061845bb58af668a4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e6b2a84838945061845bb58af668a4.exe"C:\Users\Admin\AppData\Local\Temp\c1e6b2a84838945061845bb58af668a4.exe"1⤵
- Checks processor information in registry
PID:4252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:508