Analysis

  • max time kernel
    64s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 20:58

General

  • Target

    a9f844f8720c30203228aac570468c436ca95f4c4ccd57ec752feececf553a57.exe

  • Size

    202KB

  • MD5

    f193af460e98a6dd669be8196ca4b7c9

  • SHA1

    b8ca5cd7cf9d3698ff5c51568000ca08e595dfa1

  • SHA256

    a9f844f8720c30203228aac570468c436ca95f4c4ccd57ec752feececf553a57

  • SHA512

    3a5692c7f0c0d6fcdfbdeb32ccab7ac79eaaf24bc3bd66781f709c4bf06c270ca1686af26fec935aa6ff1971103a424f70f1bbeb40e35716c6c6536e59481505

  • SSDEEP

    6144:Y9exgHUj3xw23jtMeX4vdBuF0dGCWZVonA:YAxgHUj3xwmjtMeX4VBuF0dG5P

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9f844f8720c30203228aac570468c436ca95f4c4ccd57ec752feececf553a57.exe
    "C:\Users\Admin\AppData\Local\Temp\a9f844f8720c30203228aac570468c436ca95f4c4ccd57ec752feececf553a57.exe"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads