Analysis

  • max time kernel
    156s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 04:25

General

  • Target

    95d9c1ff255b52035da3e2ff521f3f0fbb8be117ef6b1e64723e825c79b0de21/95d9c1ff255b52035da3e2ff521f3f0fbb8.exe

  • Size

    269KB

  • MD5

    2387d85c2432208da2710ef9a96c3667

  • SHA1

    5aac61b44c52ba33d5d4a0109c65f3ebc5e63c3b

  • SHA256

    95d9c1ff255b52035da3e2ff521f3f0fbb8be117ef6b1e64723e825c79b0de21

  • SHA512

    8eeb9113506a4dab777e27370e4b73c70e82890b84435125ab96fa3bd225a0d458b27d9fcb6791a55b785733befb7d7539b056fa89a38d8a1b77365652445f14

  • SSDEEP

    6144:JqB9eU/qEE7MFUMK4wBgFb1TLdO1bgABHMnq3zFGOA:JqB7qEE7FMvwmb1TLs1bgMuq3BbA

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95d9c1ff255b52035da3e2ff521f3f0fbb8be117ef6b1e64723e825c79b0de21\95d9c1ff255b52035da3e2ff521f3f0fbb8.exe
    "C:\Users\Admin\AppData\Local\Temp\95d9c1ff255b52035da3e2ff521f3f0fbb8be117ef6b1e64723e825c79b0de21\95d9c1ff255b52035da3e2ff521f3f0fbb8.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3676

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3676-0-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/3676-1-0x00000000022E0000-0x000000000232C000-memory.dmp

          Filesize

          304KB

        • memory/3676-2-0x0000000002340000-0x0000000002341000-memory.dmp

          Filesize

          4KB

        • memory/3676-3-0x0000000002330000-0x0000000002331000-memory.dmp

          Filesize

          4KB

        • memory/3676-4-0x00000000022D0000-0x00000000022D1000-memory.dmp

          Filesize

          4KB

        • memory/3676-5-0x0000000002360000-0x0000000002361000-memory.dmp

          Filesize

          4KB

        • memory/3676-6-0x00000000022C0000-0x00000000022C1000-memory.dmp

          Filesize

          4KB

        • memory/3676-7-0x0000000002380000-0x0000000002381000-memory.dmp

          Filesize

          4KB

        • memory/3676-8-0x00000000022B0000-0x00000000022B1000-memory.dmp

          Filesize

          4KB

        • memory/3676-9-0x0000000002A70000-0x0000000002A71000-memory.dmp

          Filesize

          4KB

        • memory/3676-10-0x0000000002350000-0x0000000002351000-memory.dmp

          Filesize

          4KB

        • memory/3676-11-0x0000000002A60000-0x0000000002A62000-memory.dmp

          Filesize

          8KB

        • memory/3676-12-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/3676-13-0x00000000024F0000-0x00000000024F1000-memory.dmp

          Filesize

          4KB

        • memory/3676-14-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/3676-15-0x0000000002550000-0x0000000002551000-memory.dmp

          Filesize

          4KB

        • memory/3676-17-0x0000000002520000-0x0000000002521000-memory.dmp

          Filesize

          4KB

        • memory/3676-18-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/3676-16-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/3676-19-0x00000000025C0000-0x00000000025C1000-memory.dmp

          Filesize

          4KB

        • memory/3676-20-0x00000000025B0000-0x00000000025B1000-memory.dmp

          Filesize

          4KB

        • memory/3676-22-0x0000000002590000-0x0000000002591000-memory.dmp

          Filesize

          4KB

        • memory/3676-21-0x00000000025A0000-0x00000000025A1000-memory.dmp

          Filesize

          4KB

        • memory/3676-23-0x0000000002580000-0x0000000002581000-memory.dmp

          Filesize

          4KB

        • memory/3676-24-0x00000000025D0000-0x00000000025D1000-memory.dmp

          Filesize

          4KB

        • memory/3676-25-0x0000000002560000-0x0000000002561000-memory.dmp

          Filesize

          4KB

        • memory/3676-27-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

          Filesize

          4KB

        • memory/3676-26-0x0000000002A50000-0x0000000002A52000-memory.dmp

          Filesize

          8KB

        • memory/3676-28-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-30-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

          Filesize

          4KB

        • memory/3676-29-0x00000000023A0000-0x00000000023A1000-memory.dmp

          Filesize

          4KB

        • memory/3676-31-0x0000000002570000-0x0000000002571000-memory.dmp

          Filesize

          4KB

        • memory/3676-32-0x0000000002290000-0x0000000002291000-memory.dmp

          Filesize

          4KB

        • memory/3676-33-0x0000000002A90000-0x0000000002A91000-memory.dmp

          Filesize

          4KB

        • memory/3676-34-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/3676-36-0x00000000022E0000-0x000000000232C000-memory.dmp

          Filesize

          304KB

        • memory/3676-41-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/3676-42-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/3676-47-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/3676-48-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB