Analysis

  • max time kernel
    1611s
  • max time network
    1616s
  • platform
    windows7_x64
  • resource
    win7-20230220-ja
  • resource tags

    arch:x64arch:x86image:win7-20230220-jalocale:ja-jpos:windows7-x64systemwindows
  • submitted
    16/05/2023, 06:00

General

  • Target

    images/logo.jpg

  • Size

    3KB

  • MD5

    541092162917dd706f6788a8ff8531b3

  • SHA1

    a031f52715b4aad5f5885e312fdb981188e49cea

  • SHA256

    bfc1aed394557d9f905727dce9e04f3de18d82bf175f4b4f7a6adda1fd6a57e9

  • SHA512

    614a8176f2581822b016f3a1c7da74468b497cfab011353bb614a239316c58ee321e16d58cc2426a2df873aa4258aabc1800a5c2bd43232f5f0d61a4f5e718c8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\images\logo.jpg
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1128-54-0x0000000001BC0000-0x0000000001BC1000-memory.dmp

    Filesize

    4KB

  • memory/1128-55-0x0000000001BC0000-0x0000000001BC1000-memory.dmp

    Filesize

    4KB