Analysis
-
max time kernel
1342s -
max time network
1166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 23:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
touchHLE.exe
Resource
win10v2004-20240802-en
2 signatures
1800 seconds
General
-
Target
touchHLE.exe
-
Size
9.8MB
-
MD5
9baa644b4c4c90fd33b305d41415386a
-
SHA1
23fdf6dd768b4763006f9082c92e892b4eb36588
-
SHA256
ca7b46e35b2123e115abe2885c79fd571d765f98340a7156a058e2961bef4389
-
SHA512
74fd09a9cbb1e37e86c027082c5f831b370a37d1f3600e8ec2236a1d3e32a162d4c8e0a089822f2860c9af6fa24155c14a377c32cc04fe5d282c6b5f9a81c902
-
SSDEEP
196608:aghXPBORLw6cD7ZcbuaQ4OiixZAWP1EQSGsFxV2LITrciMfMUaJ1IQQDTaAX5Gfq:agh/aLPcD7ZcbuaQ4OiixZAWP1EQSGsE
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 touchHLE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags touchHLE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 touchHLE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags touchHLE.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4084 touchHLE.exe