Analysis

  • max time kernel
    144s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 16:16

General

  • Target

    2c5e4f528a48eba56aa239a541f869d9.exe

  • Size

    1.2MB

  • MD5

    2c5e4f528a48eba56aa239a541f869d9

  • SHA1

    ae32cb5b8d4425025edeacb982f2334550973839

  • SHA256

    17c68ab233515f2b0bfbbfaffd38181b5fc2d6d1191b853a0dc7f50cef03caaf

  • SHA512

    37c5cb1799ece1da86498d7e3a8e9b1132cb7374aabe45d02572dc83618f129dc7e6c3ddd3d391c0c03727511638ea50e94a4fcc1d701779623090e7ed95f036

  • SSDEEP

    24576:Zci9FP9+poIT59mbzbEqXd78ME8sdsNDezqW1155:ZcIV+mIt9mnYQxvUsNTWd

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c5e4f528a48eba56aa239a541f869d9.exe
    "C:\Users\Admin\AppData\Local\Temp\2c5e4f528a48eba56aa239a541f869d9.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-0-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1368-1-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/1368-2-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1368-3-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB