Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 07:42

General

  • Target

    $PLUGINSDIR/modern-wizard.bmp

  • Size

    201KB

  • MD5

    3c5626cfc549b9a2fc147f84601a68b1

  • SHA1

    df2015ab7aa2eb9943cc5929fb9f7ec14a26b71e

  • SHA256

    4873a57c9b2d697e4f8689ff7a2f785fb836a6289bc377320987b5541856234c

  • SHA512

    b076a7c5350a8fda2f641c052bab4f87a602f313c91a3c0ceab2da45f9753cd89ee97497a5c67552e65a97de1366e69bfc531f6b728224e86314b90b91fd9511

  • SSDEEP

    384:Gx1uncOx0y1ARSzKyHOTEdWTBSYY0Z9XENc5iXbu8naAQHmUn0R/V8jQ1P6g1PKF:0uxVMsf8EbFGHmLRt8jQ1iE95CP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\modern-wizard.bmp
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-0-0x0000000000410000-0x0000000000411000-memory.dmp

    Filesize

    4KB

  • memory/2200-1-0x0000000000410000-0x0000000000411000-memory.dmp

    Filesize

    4KB