Analysis

  • max time kernel
    28s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2023, 13:03

General

  • Target

    assets/characters/amuleto/amulet_class.jpg

  • Size

    182KB

  • MD5

    f08be568688e8920c22e68b500e870b9

  • SHA1

    2b85401cbac315a82029ce7588e33c7d4493eb1e

  • SHA256

    bef0717b150bf05c0d6c8ee48721fc72725ef7feaf815457e9a7038563908e20

  • SHA512

    c3146ef2a9cd9878d45ec474a5bd6b76a3e3f319aced75c6d3f8bcea81c226d55de0ed449a3446b08110571420e0e745eb5aa1b3e44727b30cb849a35ae6f70f

  • SSDEEP

    3072:NCMLqAMcSBnK+/RcxsVe7wYPYhnopzM/L+T5k6RJBLRk1YLTqD7t3+Tg5W5gOZH1:ZaK+p2Qifpoj+9k6rBNkiLTqFD5QgOh1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\assets\characters\amuleto\amulet_class.jpg
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/364-54-0x000007FEFB941000-0x000007FEFB943000-memory.dmp

    Filesize

    8KB