Analysis

  • max time kernel
    94s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 01:15

General

  • Target

    factura098765679000.exe

  • Size

    1.3MB

  • MD5

    be87f3567ec40ab1dd6aa915b5ca523d

  • SHA1

    aa673ad372f8678a014dc5407ca516d9929481eb

  • SHA256

    c0a4458837e12a455f523dec478a29019597d839029b798701b5f7f1c41143b1

  • SHA512

    76caa7ca1987df1535b13436f7d64fd5955f6012163a9bdc7f4dd1cdb232a2e6245e859b077adaf8a6b7d07cca9ee11332344dded570dea23d1ab973c1bd3da6

  • SSDEEP

    24576:OAHnh+eWsN3skA4RV1Hom2KXMmHa3nhilkELKFXCQ3M5:5h+ZkldoPK8Ya3ncdLVQi

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\factura098765679000.exe
    "C:\Users\Admin\AppData\Local\Temp\factura098765679000.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1400-10-0x00000000044E0000-0x00000000044E4000-memory.dmp

    Filesize

    16KB