Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2023, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
ExtractedFiles-Untitled/extract_files/HTTP-1684519895.048645-4fdcd63ca46c4fbdc119ef47c9729729-F668hxH7lG6DMXyf5.jpg
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ExtractedFiles-Untitled/extract_files/HTTP-1684519895.048645-4fdcd63ca46c4fbdc119ef47c9729729-F668hxH7lG6DMXyf5.jpg
Resource
win10v2004-20230220-en
General
-
Target
ExtractedFiles-Untitled/extract_files/HTTP-1684519895.048645-4fdcd63ca46c4fbdc119ef47c9729729-F668hxH7lG6DMXyf5.jpg
-
Size
60KB
-
MD5
4fdcd63ca46c4fbdc119ef47c9729729
-
SHA1
e60bbfb94c5349046e5b05332cb723a52bd03bcf
-
SHA256
eb89cfa317ba38f4e282bda1f10967b42f4825173c4fb98fb131c3e33ca445f4
-
SHA512
2cb04cc9c93bf3ba716b011cc4a66f3d8124b5a6818ad1f599837b06c989bcc3d5d0688414bb3ac0ead22258ccea5dd214e241015f65f681f73655499184248f
-
SSDEEP
1536:EhEHVqg3kCrMOgvP0XJxs4h6cvlzxJ0F0we2BBll+8APAJgiGJ:TBHIOM0JSEvVj0Fa2BBllQPAuZJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 rundll32.exe
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\ExtractedFiles-Untitled\extract_files\HTTP-1684519895.048645-4fdcd63ca46c4fbdc119ef47c9729729-F668hxH7lG6DMXyf5.jpg1⤵
- Suspicious use of FindShellTrayWindow
PID:2008