Analysis
-
max time kernel
132s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
413c4f5274f0a9c0942d54591986a99d.lnk
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
413c4f5274f0a9c0942d54591986a99d.lnk
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
413c4f5274f0a9c0942d54591986a99d.lnk
-
Size
801B
-
MD5
413c4f5274f0a9c0942d54591986a99d
-
SHA1
20eff8e27f542e1392f7bede854ca9bb169fb1e7
-
SHA256
eabb08f06cfc29dbdecc044bb17b3729a7a352c313cb770da1541524fe367b28
-
SHA512
65ed84352ebac30af5fc2227e6aa295d1c6363286209b8cccd6d3507f2e4fe3a0dc8982f33e40740bbdb9a482de65a5a62209497aec0fe449bcbf44b4e615d2c
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3560 cmd.exe