Resubmissions

06-07-2024 22:02

240706-1x4eratgrl 7

06-07-2024 19:00

240706-xnn2xssgpc 10

Analysis

  • max time kernel
    1736s
  • max time network
    1119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 19:00

General

  • Target

    ThreadRacer.exe

  • Size

    534KB

  • MD5

    82c9c82d4cba471d9610ea4e977eee81

  • SHA1

    d033dafe04cc925a577750b278a8c881d172a940

  • SHA256

    cff87ebe133039b67d9a4ba6c7f370da797d51ca16c29e50cd956859e35cad1e

  • SHA512

    dca44221326502242b7d31fc2c330568bb1f89b957c7913e9488f6ac28ddde56f14dd0c2e4ff88fdb03acfab8b19637807423da87d391e5c34e5455dad35a5e6

  • SSDEEP

    6144:5POn8YlNnaeidAdYHRVEpvpcANd7WGKq:5PVYzaeidDnEpBdKGKq

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ThreadRacer.exe
    "C:\Users\Admin\AppData\Local\Temp\ThreadRacer.exe"
    1⤵
    • Checks processor information in registry
    PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads