Analysis

  • max time kernel
    32s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    30-07-2022 21:54

General

  • Target

    6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2.exe

  • Size

    407KB

  • MD5

    a3ec317d309328139331f180fd9f7bdd

  • SHA1

    677328cabd351d8851dd0c4e07c12f32a5cd768a

  • SHA256

    6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2

  • SHA512

    1db8625713e5b9be9b108c72338e1cc0d24112df0fb5ea6ef28f7782aca712dc9979021e8e4d481069ce8b924b9efa4dd3e5bbaf3c0742426e477f3a01404c52

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2.exe
    "C:\Users\Admin\AppData\Local\Temp\6132074f9d95f706b97489eb36da5ab47d8d3235b7588d5264a1aefd62de12f2.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1344-54-0x00000000762D1000-0x00000000762D3000-memory.dmp
    Filesize

    8KB