Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2024, 01:09
Behavioral task
behavioral1
Sample
ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe
Resource
win10v2004-20240611-en
General
-
Target
ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe
-
Size
202KB
-
MD5
5b6b53ce4e8d56f957893b21b580373b
-
SHA1
ff1e2d24fa7fac953f56cce2781eee3ab4c17f55
-
SHA256
ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56
-
SHA512
509fefd28159aac55f4ba67e3e5935c8229c84b03b3b81cd5719bb3f4f4d67c957ecab52221fef9a0b7e6b9a1cc8129dc73e5f7f1b53179f4727fa4787e55efe
-
SSDEEP
6144:Y9exgHUj3xw23jtMeX4vdBuF0dGCWZVoni:YAxgHUj3xwmjtMeX4VBuF0dG5x
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3520 ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe 3520 ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe 3520 ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe 3520 ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe"C:\Users\Admin\AppData\Local\Temp\ceca5c0c9e5fd3ce599159e085d40a521de5828546a48843adf1d4ec215d1d56.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3520