Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
dddd632888655353cd23d9c19d2162a8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dddd632888655353cd23d9c19d2162a8.exe
Resource
win10v2004-20240226-en
General
-
Target
dddd632888655353cd23d9c19d2162a8.exe
-
Size
52KB
-
MD5
dddd632888655353cd23d9c19d2162a8
-
SHA1
cbdc42e01492edb1ba0d8f2666dbfb1499427517
-
SHA256
e2589c3ae6985441390a0fcd715576830fda213beaa39de7e2424daa1d44081e
-
SHA512
9d3a374ca76e4868e7b55765c7558ef92b1a2ec89d100b7e78e48ead768ba4b0f8eaad7236ba8da50f88c54c7370c263cccdfaf081d2aade6c41ab6ac212c968
-
SSDEEP
384:EKylcEyLmay2MhDn6xV0XJON4kSX+d6xq2IRPfJBVlN5EpdLTWR1299G99mAca:fylcElRJcVl9wA2IRPBBVlfYLqR1Fc
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dddd632888655353cd23d9c19d2162a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dddd632888655353cd23d9c19d2162a8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4952 dddd632888655353cd23d9c19d2162a8.exe