Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2024 16:34

General

  • Target

    77d8e0a61afb5b6220ec5e8cf020f4cd.exe

  • Size

    1.1MB

  • MD5

    77d8e0a61afb5b6220ec5e8cf020f4cd

  • SHA1

    f01dc7f6049ccff41af22550296dc5bcb1f89a35

  • SHA256

    8fe2d9e0c4c5dc34483753875e857289d87edc8bc7c8394e2575282acff510da

  • SHA512

    3dd223c0b54f8feb398afa7d524fb37ef871d433786d5834f203e5608dbd7212a4816968c256efb8bde2a192cfb7b361d3ab693b116da7c4a8b523dfe12a237d

  • SSDEEP

    24576:AseuZ1SX6WKknviaQoQG4N2DeeU/NdM/hO:AseJ1hb0ghO

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77d8e0a61afb5b6220ec5e8cf020f4cd.exe
    "C:\Users\Admin\AppData\Local\Temp\77d8e0a61afb5b6220ec5e8cf020f4cd.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2544-0-0x0000000000C20000-0x0000000000C21000-memory.dmp

    Filesize

    4KB

  • memory/2544-1-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-2-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2544-4-0x0000000000C20000-0x0000000000C21000-memory.dmp

    Filesize

    4KB