Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
image.png
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
image.png
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
image.png
Resource
macos-20240410-en
General
-
Target
image.png
-
Size
94KB
-
MD5
1af2358fa1ee87b359660a7c14497081
-
SHA1
4b2ba3a8b5a68d7deace644639579d31986885c8
-
SHA256
0ed1b5bee0261bf97c9fccb3c80217388c0b12936b2626bb3eda630acfb76268
-
SHA512
9dd0c509b358b5cc3d2ba92c43b42ac4fb0b0947a8f99824f4044717de6363f6848488a45a12576cb20692c72d4996ca6bd7fa06f492ae8219febb284f87855d
-
SSDEEP
1536:IZyFSQ/tpEDLzA07dpAK65cs+eXgpVXqYnqRV7OV1FrotlgIMJz0qP4QoazN9Jhu:9FNQ3UrK6dxgWk1+t+fJz0qUunu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 1912 rundll32.exe