Analysis

  • max time kernel
    1s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/07/2024, 07:55

General

  • Target

    Device/HarddiskVolume3/Users/bennahia/Downloads/Stormshot.PC.V1.0_09dd7712bf.exe

  • Size

    2.8MB

  • MD5

    6aae47cbaa4c56095a1eb0422c1d2ecb

  • SHA1

    34e29d1801d270a2bd7ac02d4ea84c14c553d66f

  • SHA256

    ffd63fe2aeaa91f05bef47b3583290ccdba3f44912ab8b67044f3d58bf817ebf

  • SHA512

    d6b2406922d2618816db55110bf12a8579b69325e0c196d0d2508bafec68a0430acf48482160bf42cca4bd0995d864abfa2425e8e5af794c8d8d1c430fee4cff

  • SSDEEP

    49152:c8ZQVqWu+fqu79LNTRBO1L2VQjJY80KruthaPVu+2zE0y5VCmdAlacRk3Y:vZARtBEqVQq80ThzTzEElask3Y

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\bennahia\Downloads\Stormshot.PC.V1.0_09dd7712bf.exe
    "C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\bennahia\Downloads\Stormshot.PC.V1.0_09dd7712bf.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads