Analysis

  • max time kernel
    92s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 18:01

General

  • Target

    2024-07-10_a460ad961c7f1a240bac9e921c7934ed_megazord.exe

  • Size

    8.2MB

  • MD5

    a460ad961c7f1a240bac9e921c7934ed

  • SHA1

    bc44d4b4ed1d9ddfceb1d8d0e1260513604b6335

  • SHA256

    e1765f02f4197a8934c005ee7036470fea40d25b1cccf71da34d980d19e41e66

  • SHA512

    beb41fccd8984f270d8f1ae26cac69d29d8276d4084f8abef607fbd432f795d610677ca5e89f721e299130360645fa04fe1b8858a794920570654dd801047fbb

  • SSDEEP

    98304:werENRvEcR8Oory0zdgArwjtWOZKPX0EJMA49a7kIc7K8phiZ8/GSYKs:04nc+UiZ8/G

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-10_a460ad961c7f1a240bac9e921c7934ed_megazord.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-10_a460ad961c7f1a240bac9e921c7934ed_megazord.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/452-0-0x00000250AD560000-0x00000250AD561000-memory.dmp

    Filesize

    4KB

  • memory/452-2-0x00000250AD560000-0x00000250AD561000-memory.dmp

    Filesize

    4KB

  • memory/452-1-0x00000250AD560000-0x00000250AD561000-memory.dmp

    Filesize

    4KB

  • memory/452-3-0x00000250ADDD0000-0x00000250ADDD2000-memory.dmp

    Filesize

    8KB

  • memory/452-5-0x00000250ADDD0000-0x00000250ADDD2000-memory.dmp

    Filesize

    8KB

  • memory/452-4-0x00000250ADDD0000-0x00000250ADDD2000-memory.dmp

    Filesize

    8KB