Analysis
-
max time kernel
1s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/07/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/Users/bennahia/Downloads/Stormshot.PC.V1.0_09dd7712bf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/Users/bennahia/Downloads/Stormshot.PC.V1.0_09dd7712bf.exe
Resource
win10v2004-20240709-en
General
-
Target
Device/HarddiskVolume3/Users/bennahia/Downloads/Stormshot.PC.V1.0_09dd7712bf.exe
-
Size
2.8MB
-
MD5
6aae47cbaa4c56095a1eb0422c1d2ecb
-
SHA1
34e29d1801d270a2bd7ac02d4ea84c14c553d66f
-
SHA256
ffd63fe2aeaa91f05bef47b3583290ccdba3f44912ab8b67044f3d58bf817ebf
-
SHA512
d6b2406922d2618816db55110bf12a8579b69325e0c196d0d2508bafec68a0430acf48482160bf42cca4bd0995d864abfa2425e8e5af794c8d8d1c430fee4cff
-
SSDEEP
49152:c8ZQVqWu+fqu79LNTRBO1L2VQjJY80KruthaPVu+2zE0y5VCmdAlacRk3Y:vZARtBEqVQq80ThzTzEElask3Y
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Stormshot.PC.V1.0_09dd7712bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Stormshot.PC.V1.0_09dd7712bf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3036 Stormshot.PC.V1.0_09dd7712bf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\bennahia\Downloads\Stormshot.PC.V1.0_09dd7712bf.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\bennahia\Downloads\Stormshot.PC.V1.0_09dd7712bf.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3036