Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2025 03:22

General

  • Target

    SephioneRPG.exe

  • Size

    154.6MB

  • MD5

    a8714aaed9bef4935304f76fe70cd0e3

  • SHA1

    22c57cc9c1e88dc574ca3a3447cfbd8e83035cd7

  • SHA256

    8b95cc3a1feca13a650788851e1ed15d057fe610ca78454685df9eb079ce52e8

  • SHA512

    ff87fe39221580fab6b5029260959d4a9a4093883c58bc512228d11d4a16417ebda6a7436e3e120c3585c6061944d62add2339a27ce342d195efb4b2008288ec

  • SSDEEP

    1572864:wQLTsMunuCM2/w9Asn6xzIEhw3JvqzPd24cwT3tIDvvEO/TZidNoyiMhOab0XLHE:UA8g5vu

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SephioneRPG.exe
    "C:\Users\Admin\AppData\Local\Temp\SephioneRPG.exe"
    1⤵
    • Checks processor information in registry
    PID:5060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads