Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 21:39

General

  • Target

    37f0c2bb29eaa07cb5c8649871062afe3c261caaf76c7b52d49b04a97a7262e8.exe

  • Size

    963KB

  • MD5

    81bfb8f3bf26683ebb56448456d1141c

  • SHA1

    e87228c1f2cfc62bbd52910a110e980e665486d2

  • SHA256

    37f0c2bb29eaa07cb5c8649871062afe3c261caaf76c7b52d49b04a97a7262e8

  • SHA512

    1a0ce166f961eab3bcddd285afb572b8171917d0d7adaf4a9aa196cab14915ea8806ca6d015eabba6089cba8dcb84ed33467383515d471c2387b2d31464269ce

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37f0c2bb29eaa07cb5c8649871062afe3c261caaf76c7b52d49b04a97a7262e8.exe
    "C:\Users\Admin\AppData\Local\Temp\37f0c2bb29eaa07cb5c8649871062afe3c261caaf76c7b52d49b04a97a7262e8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3784

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads