Resubmissions

10-05-2024 16:25

240510-tw1h5shh47 10

24-08-2023 11:16

230824-nda8msdf8z 10

05-08-2023 22:52

230805-2tn2bsfa82 10

24-07-2023 06:25

230724-g6s6laag35 10

22-07-2023 15:57

230722-tee6wabg5w 10

20-07-2023 23:19

230720-3bb5gsbf5v 10

20-07-2023 23:06

230720-23f23sba63 10

03-02-2021 11:43

210203-6bgge2nfan 10

22-11-2020 06:42

201122-6x1at779dj 10

Analysis

  • max time kernel
    167s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2023 06:25

General

  • Target

    Endermanch@Koteyka2.exe

  • Size

    762KB

  • MD5

    7734f0e56da17e9a5940fd782d739f9b

  • SHA1

    4dfae67e40be6c4c83191ea0cf8d1b28afba884c

  • SHA256

    8855299560183b57556d9714a2b958cdc6190fcdfb270633da2a47dfeee20015

  • SHA512

    53d07938bafbcb9524cdba6d25e09fcdae128a83718ab686374f0526730e2e6380f60e3bf951601e48f6f8e64563c484ddd8baf9be2878a5ad393817028a9632

  • SSDEEP

    12288:QFQBbdVT8tOkTAoJ/z4VXKSjUSQny+uuCj6rIuIenGgOqbzxpx+13tarWIp927q5:QOBbdVT8tOcJ/z4V5USQnypu26rweGgv

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Endermanch@Koteyka2.exe
    "C:\Users\Admin\AppData\Local\Temp\Endermanch@Koteyka2.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4256-133-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-134-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-135-0x0000000002470000-0x0000000002471000-memory.dmp
    Filesize

    4KB

  • memory/4256-136-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-137-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-138-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-139-0x0000000002470000-0x0000000002471000-memory.dmp
    Filesize

    4KB

  • memory/4256-140-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-141-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-142-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-143-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-144-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-146-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-147-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-148-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-149-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-150-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-151-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-152-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB

  • memory/4256-153-0x0000000000400000-0x00000000006B8000-memory.dmp
    Filesize

    2.7MB