Analysis
-
max time kernel
24s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
basicdarkinventory.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
basicdarkinventory.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
assets/minecraft/textures/gui/container/inventory.png
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
assets/minecraft/textures/gui/container/inventory.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
pack.mcmeta
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
pack.mcmeta
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
pack.png
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
pack.png
Resource
win10v2004-20230703-en
General
-
Target
pack.png
-
Size
735B
-
MD5
2130803c1517ddab63c08f443a547719
-
SHA1
e50d1767581fd595379d437cd2c740d458435692
-
SHA256
2a91223f3624cbdd922b403e3aaf80165182f65f54be9af5c1cf1c9013352afd
-
SHA512
d6408a6c2f9c055d0e591fbce5babaf5b642c8a0e12a687c7c4b4df4b74cbe4a6cc4e16ad6feb85e04ed36718c22adb3d38edc1f025d21c141c2b889a7f9c817
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 rundll32.exe