Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 07:05

General

  • Target

    tmp.exe

  • Size

    11.6MB

  • MD5

    5cc2ca9db11e7259b67b3413e0f13f40

  • SHA1

    b05ccd7c4deb0d44c08ba1458f6b869d797eaba6

  • SHA256

    b43796db8c50f26fdd3082fc0c2c30137c6565df9822e5972e92045055874934

  • SHA512

    34e814983ab417458ea3d7f520ef330f0c3e81a092f9f828e875fd3a2ae429a79f0ed6e346378e59d42d8c4e4018f39347b2c360184336504fdcc3e8537aea87

  • SSDEEP

    196608:HkaWbmuabfKxQbq1h4+gyUPpCdxGy0o3mPWDW8Rv5/eDjwN71a/bEbCLE3dRisRN:EaWitOxP1hkpiDmPWDW8R5/cjwJXeY9H

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:4700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads