Analysis

  • max time kernel
    147s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 06:34

General

  • Target

    PAIcom/PAIcom/privileges.exe

  • Size

    1.2MB

  • MD5

    6f256948e600cf051d082be1645233fe

  • SHA1

    e56713abea655ba30e2005755deb292987bb32c8

  • SHA256

    d55c89ab6cf5bf0a7823666d5081bbba6b7dcf2ecbc3991cc4367fa08b2bd7a5

  • SHA512

    5a9ecfd324e4e5e429b0b10a1b3de64efdd0d5dbe222cbca54acc447fd1f07ff802ae9ed40099df3562ea2a34d091bea71103834440e028d7741721e4e5f468c

  • SSDEEP

    24576:kYWfmde3WThB+faXexi41hmVxg1gb/tbP8e8SplH70yPh:rWfmde0IfNxS3/tb8e8SXJ

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PAIcom\PAIcom\privileges.exe
    "C:\Users\Admin\AppData\Local\Temp\PAIcom\PAIcom\privileges.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2224

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads