Analysis

  • max time kernel
    1s
  • max time network
    10s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-05-2024 22:27

General

  • Target

    renderer.exe

  • Size

    869KB

  • MD5

    b9181f5bf4e843a0ddd99fc0f49b9d51

  • SHA1

    e8048e40956ec78c0680008737796661ad5b35ee

  • SHA256

    bbb9e2cdad56a9d1876259228fa03123a5ce7527ce91771b2ddc9afc798329fb

  • SHA512

    aec9019eaafbce241276113517d60922fe6af763d8582849453b3ef1f282e56c623321d61cb6b50b99c7a667565437209c2fda005bc803bf6e83f8cef74d9087

  • SSDEEP

    12288:kvwEyg8sbFSfJxQINjPsgav7AqQcnR+SClQq4qBpHtPs:kvwEyg8sbvINjPsgavKBSClQDqBpd

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\renderer.exe
    "C:\Users\Admin\AppData\Local\Temp\renderer.exe"
    1⤵
    • Checks processor information in registry
    PID:816
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 612
      2⤵
      • Program crash
      PID:3612

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads