Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
Honk_stare.png
Resource
win7-20240419-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Honk_stare.png
Resource
win10v2004-20240426-en
7 signatures
150 seconds
General
-
Target
Honk_stare.png
-
Size
1.6MB
-
MD5
a550621feaa3059d83127306121896e6
-
SHA1
a56fd886c5525fe066c4c71712fdd997ea16153c
-
SHA256
ff576b98b657feaa640c2f89dd2832241c8b1706a6d125f1c3a6991bacced4f5
-
SHA512
dfa25d3a58d394bc8d0846aab8d2d57e26f76a1939e1f45c0eb9fedf91e2a4b88bd59612074ed05224d24b128d9a2f14c3f0c5e8229dad38fdac070d009bb314
-
SSDEEP
24576:5SfFi6NAgZLFnirIaOCFatUCT7MybzgGuLxgW77bJiUqLCefu:5usfwJirIaO0CPXMtYU2C1
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 rundll32.exe