Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 18:43
Behavioral task
behavioral1
Sample
1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe
-
Size
2.5MB
-
MD5
54bb597adcd52329b24fa873b2f64f02
-
SHA1
658df16d5114d59f38365e8646f98b857dea0a38
-
SHA256
1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010
-
SHA512
79360a9c4911bf73a9f9903b87bcf5440c49d15a85611eb210ae2397e22d1086df363d75d65049a81a0a54fa508deee8b0a445e0a2d08ae87edf0849b030a939
-
SSDEEP
49152:wUK7u56sAlGcS9SczGo2IyocnGtFH1S2SY0pFBK3dQqgTLrhyphs84QImmAjc9:VKKIsA+SU7HgBJXK3SnLrhyph9jI
Malware Config
Signatures
-
Meduza family
-
resource yara_rule behavioral2/memory/3208-0-0x00007FF7CE2B0000-0x00007FF7CEA20000-memory.dmp upx behavioral2/memory/3208-1-0x00007FF7CE2B0000-0x00007FF7CEA20000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3208 1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe"C:\Users\Admin\AppData\Local\Temp\1409d0bc4bf52236303eab2d1823c4bc23d5d84ed00c1027ea73083496459010.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3208