Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 18:50
Static task
static1
Behavioral task
behavioral1
Sample
277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe
Resource
win10v2004-20240226-en
General
-
Target
277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe
-
Size
819KB
-
MD5
18f5391a90deb229deab12414c0efcc4
-
SHA1
8c60e296a4b25e84e78edfc0cb518d1aa328d8e6
-
SHA256
277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3
-
SHA512
60c61512ea1131bf28f12e9c9f4929422e360b1ace10a0efb9797b46cbc9fd4a05aa436c6fc90fe79a8c818bdd1bc5fabbba4d1573f2e70985d49226995b5ab0
-
SSDEEP
12288:mCdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgabD2xQ:mCdxte/80jYLT3U1jfsWabD2xQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe 2172 277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe"C:\Users\Admin\AppData\Local\Temp\277ccbe8521e8cff403fa40ae7f5c2b40c4fb5b790a003a746f3337a8fc58ed3.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2172