Resubmissions

03-07-2024 22:59

240703-2yn7wszhlp 10

03-07-2024 16:13

240703-tn93lsyglf 10

03-07-2024 16:11

240703-tm84xsyfma 10

10-05-2024 16:25

240510-tw1h5shh47 10

24-08-2023 11:16

230824-nda8msdf8z 10

Analysis

  • max time kernel
    167s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2023 06:25

General

  • Target

  • Size

    762KB

  • MD5

    7734f0e56da17e9a5940fd782d739f9b

  • SHA1

    4dfae67e40be6c4c83191ea0cf8d1b28afba884c

  • SHA256

    8855299560183b57556d9714a2b958cdc6190fcdfb270633da2a47dfeee20015

  • SHA512

    53d07938bafbcb9524cdba6d25e09fcdae128a83718ab686374f0526730e2e6380f60e3bf951601e48f6f8e64563c484ddd8baf9be2878a5ad393817028a9632

  • SSDEEP

    12288:QFQBbdVT8tOkTAoJ/z4VXKSjUSQny+uuCj6rIuIenGgOqbzxpx+13tarWIp927q5:QOBbdVT8tOcJ/z4V5USQnypu26rweGgv

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4256-133-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-134-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-135-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/4256-136-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-137-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-138-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-139-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/4256-140-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-141-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-142-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-143-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-144-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-146-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-147-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-148-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-149-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-150-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-151-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-152-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB

  • memory/4256-153-0x0000000000400000-0x00000000006B8000-memory.dmp

    Filesize

    2.7MB