Malware Analysis Report

2025-08-10 21:22

Sample ID 240527-nr8q3aah88
Target local-spam.PNG
SHA256 8ecdb5511c3d630f330c5ff20580445336f2ad3419b38330e972b5891b990259
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

8ecdb5511c3d630f330c5ff20580445336f2ad3419b38330e972b5891b990259

Threat Level: Likely benign

The file local-spam.PNG was found to be: Likely benign.

Malicious Activity Summary


Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-27 11:38

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-27 11:38

Reported

2024-05-27 11:42

Platform

win7-20240221-en

Max time kernel

120s

Max time network

121s

Command Line

C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\local-spam.png

Signatures

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\System32\rundll32.exe N/A

Processes

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\local-spam.png

Network

N/A

Files

memory/2020-0-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

memory/2020-1-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-27 11:38

Reported

2024-05-27 11:42

Platform

win10v2004-20240426-en

Max time kernel

93s

Max time network

101s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\local-spam.png

Signatures

Enumerates physical storage devices

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\local-spam.png

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp

Files

N/A