Resubmissions

10-05-2024 16:25

240510-tw1h5shh47 10

24-08-2023 11:16

230824-nda8msdf8z 10

05-08-2023 22:52

230805-2tn2bsfa82 10

24-07-2023 06:25

230724-g6s6laag35 10

22-07-2023 15:57

230722-tee6wabg5w 10

20-07-2023 23:19

230720-3bb5gsbf5v 10

20-07-2023 23:06

230720-23f23sba63 10

03-02-2021 11:43

210203-6bgge2nfan 10

22-11-2020 06:42

201122-6x1at779dj 10

Analysis

  • max time kernel
    159s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2023 06:25

General

  • Target

    Endermanch@Koteyka2.exe

  • Size

    762KB

  • MD5

    7734f0e56da17e9a5940fd782d739f9b

  • SHA1

    4dfae67e40be6c4c83191ea0cf8d1b28afba884c

  • SHA256

    8855299560183b57556d9714a2b958cdc6190fcdfb270633da2a47dfeee20015

  • SHA512

    53d07938bafbcb9524cdba6d25e09fcdae128a83718ab686374f0526730e2e6380f60e3bf951601e48f6f8e64563c484ddd8baf9be2878a5ad393817028a9632

  • SSDEEP

    12288:QFQBbdVT8tOkTAoJ/z4VXKSjUSQny+uuCj6rIuIenGgOqbzxpx+13tarWIp927q5:QOBbdVT8tOcJ/z4V5USQnypu26rweGgv

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Endermanch@Koteyka2.exe
    "C:\Users\Admin\AppData\Local\Temp\Endermanch@Koteyka2.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2616-54-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-55-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-56-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/2616-57-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-58-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-59-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-60-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/2616-61-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-62-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-63-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-64-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-65-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-66-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-67-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-68-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-69-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-70-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-71-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-72-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-73-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/2616-74-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB