Analysis
-
max time kernel
19s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
UnparkCpu.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
UnparkCpu.exe
Resource
win10v2004-20240730-en
General
-
Target
UnparkCpu.exe
-
Size
876KB
-
MD5
254fe03a202beb7d68bc322f200a480c
-
SHA1
8b7b41baa2f7fa830b52a4f70641d6f933018c7a
-
SHA256
8fce32ef6687aeb691c1a9427cfbf11fd6e9c0407bb8dcbab1f839d88077172e
-
SHA512
e69df4072539a443fef25bd4a061ff832e905b30789acd683b982f0c98636830af29ed84f2e11c0f074ea7bc7b2854adb9cb2f8d9fdd8c4496c5f952ab39ebdf
-
SSDEEP
24576:P7n9hdfIh7UlrVCReU1VijlsVCReUiaiU:P7n9hdq7Ulr4ReUfijls4ReUhi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UnparkCpu.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz UnparkCpu.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UnparkCpu.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe 2744 UnparkCpu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UnparkCpu.exe"C:\Users\Admin\AppData\Local\Temp\UnparkCpu.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2660