Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 01:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e072809f8ac77348087c2f235d941e76.exe
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e072809f8ac77348087c2f235d941e76.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
e072809f8ac77348087c2f235d941e76.exe
-
Size
289KB
-
MD5
e072809f8ac77348087c2f235d941e76
-
SHA1
f5a933acf97e301b07e014a507740c209abe3ff4
-
SHA256
26c1fba671b3def121f817b89f1fedac1129656e2b15d4360653827645614d6b
-
SHA512
5f361ebcef51dec47be1ea5a6c5d1b3fe555f46e432a4d7ef76c2465eefad42f17890167b95c16fb4117af93bf26a158d7d25eec7977cc285d448174737c4dfd
-
SSDEEP
6144:kHjKw986OcpZSprrh8VYiDJQ0XFnBbHDXHZFtlHg4:kz8FcpZSxrSXhnB3XH7tdr
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 e072809f8ac77348087c2f235d941e76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\Identifier e072809f8ac77348087c2f235d941e76.exe