Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
order SL2024-01.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
order SL2024-01.exe
Resource
win10v2004-20240508-en
General
-
Target
order SL2024-01.exe
-
Size
1.2MB
-
MD5
827d17ea8908eee608affcbf9a41a4a8
-
SHA1
082df822af7674e9851f707a11eb948d9dd3107b
-
SHA256
12afbeae36c86ffa1781c6faac9cd3b460fe5835c55b901e7ec28e39df418d5e
-
SHA512
71d6039b72fb1c31f47233d8706fc846da76016f8f99bf550b9933add346e4f6847ae2f9d26dd0ebbde5beb2ad1d4690e1b29a2761fd2232345f9657cb89722e
-
SSDEEP
24576:0AHnh+eWsN3skA4RV1Hom2KXMmHaoXBKqF3Qb11YDO1Qo95:Dh+ZkldoPK8YaokqFWoDn6
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
order SL2024-01.exepid process 2360 order SL2024-01.exe 2360 order SL2024-01.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
order SL2024-01.exepid process 2360 order SL2024-01.exe 2360 order SL2024-01.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\pyogenesisFilesize
305KB
MD55a82d2ba2918d9b69b8d2e33453508db
SHA110630a647881d8afbcab3792b75fc8b9ad5951dc
SHA256c33f87666040884ab0f834f40bc9b9439f67c21c0397c10989081a1cbaf3ef45
SHA51286113245589e0d877fafa9436501d931c7a1ec5d2afc0ea415e74b85b00209157ced185a8d41076d0537ca160a8cbbbbcbbfed3bf4f3495fe696a1b59b169258
-
memory/2360-11-0x00000000000C0000-0x00000000000C4000-memory.dmpFilesize
16KB