Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 06:27

General

  • Target

    42.exe

  • Size

    1.1MB

  • MD5

    46dcf1cabaebbae61472fc0151dea92b

  • SHA1

    ab1bcd43847039ae8ce9f28a8bec60ae0219b3b2

  • SHA256

    eedfb4aa8784f4f2b221e4e3ab6058045a6575b8f4ee0f33d03c2dd93a8f7789

  • SHA512

    81d7fc7f294001bb74bfaff2664dc4f727e33ff2ec30a068aa43baeb50563196ea2a4c3d271027c1befbc0d0f1e317d2faa7e506c1ff23e4cf90cd3ce608fe81

  • SSDEEP

    24576:sAHnh+eWsN3skA4RV1Hom2KXMmHaxGqlaRXfoZ+2o1+5:Lh+ZkldoPK8YaxGSqAZIG

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42.exe
    "C:\Users\Admin\AppData\Local\Temp\42.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2140

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2140-10-0x0000000000270000-0x0000000000274000-memory.dmp

    Filesize

    16KB