Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 16:29

General

  • Target

    CPUEater.exe

  • Size

    490KB

  • MD5

    27bbb22da491eedb0c0b87de0516218e

  • SHA1

    33dc0706ce7b9525ec3fb9f3275b414d6169455f

  • SHA256

    0f1fddf131e9e75e787393588846e4bca08120b41f3e69c3a514b9fe5ea7db8a

  • SHA512

    a5aba70f8daf8c9640e481f46c2d76e36aa3061a8c64e715e4e27ef73ce9b2d03ed9963696b91233b0722a450338fff1fb06ef0d7d3df4d89665acf4c089ba28

  • SSDEEP

    6144:7+O9eBwatRqIx8xUbjqc44pWWXwAdfNNGvsXIw/0WKprM5B7VPShrkY:7UBwSLsw+c44p/XwAVNYrw/0ZM5p2YY

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CPUEater.exe
    "C:\Users\Admin\AppData\Local\Temp\CPUEater.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads