Analysis

  • max time kernel
    44s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    19-04-2022 03:05

General

  • Target

    34d2a14d546ffabc3933034d9c77353243ee4230cedf0ab40fcc2a30a4c24909.exe

  • Size

    885KB

  • MD5

    2cc234aa871aa1a96ba0dab26fd237a1

  • SHA1

    349342720a248088223aee93eb19e6ddcfbee05a

  • SHA256

    34d2a14d546ffabc3933034d9c77353243ee4230cedf0ab40fcc2a30a4c24909

  • SHA512

    18ed5fcdf8679bcc90f8601dcd3b5ee3b34a038bd3a338e56d0736302c0962c9787ae73940a4f180cf927b45b1ad20a616b24c5833ded3d7b346c856fa360590

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34d2a14d546ffabc3933034d9c77353243ee4230cedf0ab40fcc2a30a4c24909.exe
    "C:\Users\Admin\AppData\Local\Temp\34d2a14d546ffabc3933034d9c77353243ee4230cedf0ab40fcc2a30a4c24909.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1808

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-54-0x000007FEFB671000-0x000007FEFB673000-memory.dmp
    Filesize

    8KB