Resubmissions

06-07-2024 22:02

240706-1x4eratgrl 7

06-07-2024 19:00

240706-xnn2xssgpc 10

Analysis

  • max time kernel
    1710s
  • max time network
    1142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 19:00

General

  • Target

    Insights.exe

  • Size

    750KB

  • MD5

    412e905b54abd1e14ed03ce19d090e70

  • SHA1

    0808d564ba46022b6bdc5457838d1b17859831f7

  • SHA256

    55418f5693c9a5d3e28508b39bac660eaab178065ba6789298e1fd8002095a31

  • SHA512

    eac32d75bb94d76433050973dba949cf7a1fe99786ba2854ee063cd750ddae424a51c7817c256c6b0c1d38f43f58dd0a382d4513ba99dca7fd50248bb356d84e

  • SSDEEP

    6144:vEKsfeywcV9FOSZGItAOvd0UWI3csjf+pgxLyN6yr05/E9g0l873rYO+g7WGKV:NsfeRiOSZXtAOvd0m3+p8Ly16/sYKGK

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Insights.exe
    "C:\Users\Admin\AppData\Local\Temp\Insights.exe"
    1⤵
    • Checks processor information in registry
    PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads