Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 14:02
Behavioral task
behavioral1
Sample
fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe
Resource
win10v2004-20231023-en
General
-
Target
fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe
-
Size
324KB
-
MD5
a4a780fbffd6dd4e75ac193c4aef796e
-
SHA1
1481169d648c3544f7cb4a046942a88191decd4b
-
SHA256
fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91
-
SHA512
070da74c8f719cba5032f079ffd8d160928c065bf0fdadd8be7193d7e17f8459524e0be6bfe8069dfc5b82e532c1dbd5dbb0bb0d45a5b7c29d97614c424f8796
-
SSDEEP
6144:XvEWTCNgXQVMizzxJu7QqmOuGnpam5oVPUgTbcfjn7Lh95UZ6q57o:XsWigXKzzxJuTmO9nc/PUYcfjn5YZ6co
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1124-0-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/1124-1-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/1124-2-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/1124-4-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/1124-13-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/1124-14-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/1124-17-0x0000000000400000-0x00000000004E7000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1124 fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe 1124 fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe 1124 fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1124 fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe 1124 fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe 1124 fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe"C:\Users\Admin\AppData\Local\Temp\fd1ae82bc458a270c509eb10f201ae262a53551b0cae09db9fca3e1a99336e91.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1124
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52B
MD57a8906e198a9d611436cb918891e8b12
SHA10107aa6e6a747cbd8ae06df06c0d7b3c5faa719a
SHA256e4cd9e47d395dae98246ab193b0d899351ccfadfe3e01483ecdf6c2afa0ec98c
SHA5120a14fb3740325a9c8ab49549d7fae56b35db1c70b5cd550802917c53e7d9a760ba78ef1f43505430147e83119fb3737718263bd4d9131b06b1c737e76490af57