Analysis

  • max time kernel
    122s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 08:20

General

  • Target

    6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865.exe

  • Size

    155KB

  • MD5

    830f6068c5612b827e0bb600b1ac688e

  • SHA1

    4fb031f28b286a7cacca2f27cb254d8169a345d9

  • SHA256

    6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865

  • SHA512

    e5162fe2c16792ee375f3b0c00095ae9c5ff2e4775944484bf3472b9e93c75b4124b5237397183613d20a3159c04afa6cb99404aec42e5e6bcd674433bd2ddc4

  • SSDEEP

    3072:NKaVJNOe2J+ypc8TXWvHxqBuedLX6LYxmVsu1edEYdY0z:7Oe2J+yK/0kGXVxmsz

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865.exe
    "C:\Users\Admin\AppData\Local\Temp\6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2852

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2852-0-0x000001857F350000-0x000001857F351000-memory.dmp

    Filesize

    4KB

  • memory/2852-2-0x0000000180000000-0x0000000180068000-memory.dmp

    Filesize

    416KB

  • memory/2852-5-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB