Analysis
-
max time kernel
1560s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
Virus Maker (1).rar
Resource
win7-20231215-en
5 signatures
1800 seconds
Behavioral task
behavioral2
Sample
readme.txt
Resource
win7-20231215-en
1 signatures
1800 seconds
General
-
Target
Virus Maker (1).rar
-
Size
82KB
-
MD5
d1f61793e7898df4b27e3345764ceca8
-
SHA1
f03b91146aeaf753b565620a022a238830ed56d4
-
SHA256
d32f3a860b863d38f117c2e7efcaa6909583d418f8578b526a7ed0153529644b
-
SHA512
6491767f6db68886d000b173306377f3b0bf2d6db765ce4c14139c9ad09fa44e6cb75489f3858e45c4000333d2ad517721f81cc48e94de25c75c17cac36bb617
-
SSDEEP
1536:S0s/fG5w2aRBBNACjLkvSrfqAbv0Zarjg5AfDLCNE3Ztg/776X95:5s/+uRBmvMfzrhfbD2NStk76N5
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2744 7zFM.exe Token: 35 2744 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2744 1708 cmd.exe 29 PID 1708 wrote to memory of 2744 1708 cmd.exe 29 PID 1708 wrote to memory of 2744 1708 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Virus Maker (1).rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Virus Maker (1).rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2744
-