Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 15:13

General

  • Target

    Purge.exe

  • Size

    24KB

  • MD5

    b02916e5c5215ef3ce25269c8d8afbe2

  • SHA1

    7ea2e4eebea27ade84075a5bd47e048297377259

  • SHA256

    b4e9d14e4ea8a1c459805ec46870f12a3e6ea3308864511a3d9c7af9fb841403

  • SHA512

    c84cd98801dbc515f8e800c5fae57158d4167347c2267f1decbf37e98819b2bc1e9439eacec71eaad1c6ece62bf468b21db9cc53e6568cc73499595b1935296e

  • SSDEEP

    384:lMX3iNFRHDy0nxaP/JqiKV+aQlSp591U7qO7o4FQcc4KVOJ5ogxlwAx9sLtsNtt7:qHitm/JqiO+aB5s7qOUvOJ5ogDrCO8tm

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purge.exe
    "C:\Users\Admin\AppData\Local\Temp\Purge.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2304-0-0x00000000009E0000-0x00000000009EC000-memory.dmp
    Filesize

    48KB

  • memory/2304-1-0x00000000740C0000-0x00000000747AE000-memory.dmp
    Filesize

    6.9MB

  • memory/2304-2-0x0000000004EE0000-0x0000000004F20000-memory.dmp
    Filesize

    256KB

  • memory/2304-3-0x0000000004EE0000-0x0000000004F20000-memory.dmp
    Filesize

    256KB

  • memory/2304-4-0x0000000004EE0000-0x0000000004F20000-memory.dmp
    Filesize

    256KB

  • memory/2304-5-0x00000000740C0000-0x00000000747AE000-memory.dmp
    Filesize

    6.9MB

  • memory/2304-6-0x0000000004EE0000-0x0000000004F20000-memory.dmp
    Filesize

    256KB