Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-05-2024 22:27
Behavioral task
behavioral1
Sample
renderer.exe
Resource
win10-20240404-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
renderer_d.exe
Resource
win10-20240404-en
2 signatures
150 seconds
General
-
Target
renderer_d.exe
-
Size
1.8MB
-
MD5
66426bb2d76bd2df804438dfeac49a8f
-
SHA1
96447ffa16edbc60bfb179b9ffa3b283c4776808
-
SHA256
a71928cfd4af6f102b0b485128bc8e5614d150e16d0a3ede75247ad441e2e7e8
-
SHA512
8b3021d98db35c8ea43e94e095b3c3b4b7ade7060a3b7098047edb70b2c17e036c0a0a4ab62d3c2bfbe8041c1837841cd11f2671dc1aa039684fbffcab780959
-
SSDEEP
12288:mhjJiMaqErtIY1ZZHCNDD5gq8UR3xmLYTy4oSw1293NGMPlr6ovoYQO+OyXOK2it:iJiVD2cHwE45oxsSgWsdaAVzLQOPt
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1116 2420 WerFault.exe renderer_d.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
renderer_d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz renderer_d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 renderer_d.exe