Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 22:25
Static task
static1
Behavioral task
behavioral1
Sample
sales payment.scr
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
sales payment.scr
-
Size
711KB
-
MD5
28996f9f1e4b645eed15f6bc8b51d937
-
SHA1
190bec54bcc632a8d676ff9df2b4bcec455c25fc
-
SHA256
66b2b5112b9aa05cd1c1d65b09499aecd3798e90af4cb2bfc7844372b4ba6f37
-
SHA512
63a43eb9e28a869d0af32b745e61f39b429179af988592f98dec6e2175a013a442b4e1f1b21fa5ef378f92e9849c62c4dc7e21f169b745000f2bdc603abe1599
Score
1/10
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
sales payment.scrpid process 1636 sales payment.scr 1636 sales payment.scr 1636 sales payment.scr -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
sales payment.scrpid process 1636 sales payment.scr 1636 sales payment.scr 1636 sales payment.scr -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
sales payment.scrdescription pid process target process PID 1636 wrote to memory of 1452 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1452 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1452 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1452 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1632 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1632 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1632 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1632 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 952 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 952 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 952 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 952 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1100 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1100 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1100 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 1100 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 376 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 376 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 376 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 376 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 660 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 660 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 660 1636 sales payment.scr sales payment.scr PID 1636 wrote to memory of 660 1636 sales payment.scr sales payment.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\sales payment.scr"C:\Users\Admin\AppData\Local\Temp\sales payment.scr" /S1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sales payment.scr"C:\Users\Admin\AppData\Local\Temp\sales payment.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\sales payment.scr"C:\Users\Admin\AppData\Local\Temp\sales payment.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\sales payment.scr"C:\Users\Admin\AppData\Local\Temp\sales payment.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\sales payment.scr"C:\Users\Admin\AppData\Local\Temp\sales payment.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\sales payment.scr"C:\Users\Admin\AppData\Local\Temp\sales payment.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\sales payment.scr"C:\Users\Admin\AppData\Local\Temp\sales payment.scr"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-54-0x0000000076421000-0x0000000076423000-memory.dmpFilesize
8KB