Analysis

  • max time kernel
    143s
  • max time network
    72s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 03:57

General

  • Target

    04381155b47a2f101e8c4481085e47b6.exe

  • Size

    6.7MB

  • MD5

    04381155b47a2f101e8c4481085e47b6

  • SHA1

    b4c1e7a07bef3b98cda40b5731c4e57bc22767b1

  • SHA256

    1370b203b208bc3bbff5b91baba5ed5ed41fbca45e1451382ee4e457eb7acc8a

  • SHA512

    342840e979bb490b0c9da5912e495c1dbd6b235ccc9879bda3d46d049ac0f92587aa5eee5746b48df5e4891d0a17edc196db393afacb8a951aba2e3b82f55841

  • SSDEEP

    196608:7CKNckLogOteGfXhuQ+sM6auHdktHkAMgwxD5G:eOctTosPbHgxID5

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04381155b47a2f101e8c4481085e47b6.exe
    "C:\Users\Admin\AppData\Local\Temp\04381155b47a2f101e8c4481085e47b6.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads