Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/05/2024, 20:53

General

  • Target

    bcrypt64.exe

  • Size

    13KB

  • MD5

    45af89491e71773b30f0645bfeaf19ef

  • SHA1

    9dd14ae5701da2a7f388dd255dc8917c5eb8630f

  • SHA256

    3fe214642b9fbcd862626373564d931649b0edc4fcdd5ae697134b4a552687df

  • SHA512

    eca61d8b5a6a8a8bb5592ad309b1aa4fb7587e8b92a67203159fca1e15f71d24916e97478eb13a327ac4df5ffd0f7c1e0a113406d124ca77163bc352cec8d345

  • SSDEEP

    384:vUAuvBxy1XsWZXeosjHWUc5tuK5sci3hCI:viM3uJc5tuK5scYhb

Score
5/10

Malware Config

Signatures

  • Checks system information in the registry 2 TTPs 4 IoCs

    System information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 16 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcrypt64.exe
    "C:\Users\Admin\AppData\Local\Temp\bcrypt64.exe"
    1⤵
    • Checks system information in the registry
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2916-0-0x000000007397E000-0x000000007397F000-memory.dmp

    Filesize

    4KB

  • memory/2916-1-0x0000000000CE0000-0x0000000000CE8000-memory.dmp

    Filesize

    32KB