Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 07:05

General

  • Target

    tmp.exe

  • Size

    11.6MB

  • MD5

    5cc2ca9db11e7259b67b3413e0f13f40

  • SHA1

    b05ccd7c4deb0d44c08ba1458f6b869d797eaba6

  • SHA256

    b43796db8c50f26fdd3082fc0c2c30137c6565df9822e5972e92045055874934

  • SHA512

    34e814983ab417458ea3d7f520ef330f0c3e81a092f9f828e875fd3a2ae429a79f0ed6e346378e59d42d8c4e4018f39347b2c360184336504fdcc3e8537aea87

  • SSDEEP

    196608:HkaWbmuabfKxQbq1h4+gyUPpCdxGy0o3mPWDW8Rv5/eDjwN71a/bEbCLE3dRisRN:EaWitOxP1hkpiDmPWDW8R5/cjwJXeY9H

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-54-0x00000000762B1000-0x00000000762B3000-memory.dmp
    Filesize

    8KB

  • memory/1928-55-0x0000000075221000-0x0000000075223000-memory.dmp
    Filesize

    8KB