Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 01:29

General

  • Target

    e072809f8ac77348087c2f235d941e76.exe

  • Size

    289KB

  • MD5

    e072809f8ac77348087c2f235d941e76

  • SHA1

    f5a933acf97e301b07e014a507740c209abe3ff4

  • SHA256

    26c1fba671b3def121f817b89f1fedac1129656e2b15d4360653827645614d6b

  • SHA512

    5f361ebcef51dec47be1ea5a6c5d1b3fe555f46e432a4d7ef76c2465eefad42f17890167b95c16fb4117af93bf26a158d7d25eec7977cc285d448174737c4dfd

  • SSDEEP

    6144:kHjKw986OcpZSprrh8VYiDJQ0XFnBbHDXHZFtlHg4:kz8FcpZSxrSXhnB3XH7tdr

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e072809f8ac77348087c2f235d941e76.exe
    "C:\Users\Admin\AppData\Local\Temp\e072809f8ac77348087c2f235d941e76.exe"
    1⤵
    • Checks processor information in registry
    PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2720-0-0x0000000001000000-0x0000000001087000-memory.dmp

    Filesize

    540KB

  • memory/2720-1-0x0000000001000000-0x0000000001087000-memory.dmp

    Filesize

    540KB

  • memory/2720-2-0x0000000001000000-0x0000000001087000-memory.dmp

    Filesize

    540KB