Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 20:27
Behavioral task
behavioral1
Sample
fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe
Resource
win10v2004-20250314-en
General
-
Target
fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe
-
Size
16KB
-
MD5
3dd73fb50f8947643c7e4356e14cba92
-
SHA1
bd02267a04c323e87c37884ac26fd1213611f306
-
SHA256
fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e
-
SHA512
5860f27047c8149c50549ecbdc973d1bde6f4e9a0379ad679ff8204647654bbaae7b33747c3db8e771913f31a8b2c5d3e01bac2b51397caa6181e295c2fdbf65
-
SSDEEP
384:IBFVK58y3CtNNLTnIX9oDPlMNcLlb5sVKZyI5Ct:YFVK5nStN1kclMNEDo
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2072 fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe"C:\Users\Admin\AppData\Local\Temp\fd070899107cd15d65e14aa61343de0893a47dfdedb0911167ad1df8db54f01e.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2072