Analysis
-
max time kernel
19s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
Zerolocker.zip
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Zerolocker.zip
Resource
win11-20240221-en
0 signatures
150 seconds
General
-
Target
Zerolocker.zip
-
Size
170KB
-
MD5
78ccd1b69323ef0c601d7dee32bacecf
-
SHA1
e05ef1e93738d77e1c9f671a7456f60e3e9935bb
-
SHA256
d7e74233f855b8a347000661329170c08aabf91e00f77e9a14f7ded12b02511c
-
SHA512
9df2dc070fddc9b3cb71076e91906dfb40278596e231e7df1ad6aa436d0f232147ab6623c30b83b3481805efad935059a6e48f553ca7a0c1c84881a10e20ba3a
-
SSDEEP
3072:AofpYcnMByc2zNjZlZBOjS+rk7L2d7JmPinkg4+NW56KutQwB+O1eA/M9gAeDuq7:yDuqJGfWeVSgE29xxspm0n1vuz3j9xvC
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2684 7zG.exe Token: 35 2684 7zG.exe Token: SeSecurityPrivilege 2684 7zG.exe Token: SeSecurityPrivilege 2684 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 7zG.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Zerolocker.zip1⤵PID:2064
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:1248
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Zerolocker\" -spe -an -ai#7zMap5669:100:7zEvent313141⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2684