Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
a75d56ee7274b8953b3acec92cda228c2a722091e02297c80ea2d0cfa72d02f7.7z
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a75d56ee7274b8953b3acec92cda228c2a722091e02297c80ea2d0cfa72d02f7.7z
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10v2004-20240226-en
General
-
Target
a75d56ee7274b8953b3acec92cda228c2a722091e02297c80ea2d0cfa72d02f7.7z
-
Size
3.3MB
-
MD5
84f1453c340012e0ea9b0e0a894cea8f
-
SHA1
64af8b9f1800a6e6fd0e90bd3cd00551662d3904
-
SHA256
a75d56ee7274b8953b3acec92cda228c2a722091e02297c80ea2d0cfa72d02f7
-
SHA512
cd6d070b878d977c9bec1356536cf77583d6983dac91c8854024237c061b43feb19a28a801640f933e3160e3d0d01ded2b1328008a3219a31957b05acd83a706
-
SSDEEP
98304:S1dhL0VGAbLpHAk1Dds8nWqimcV30ahet8:S1d4bxJxGoWqi5EaheO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2624 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2624 7zFM.exe Token: 35 2624 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 2624 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1732 wrote to memory of 2624 1732 cmd.exe 7zFM.exe PID 1732 wrote to memory of 2624 1732 cmd.exe 7zFM.exe PID 1732 wrote to memory of 2624 1732 cmd.exe 7zFM.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a75d56ee7274b8953b3acec92cda228c2a722091e02297c80ea2d0cfa72d02f7.7z1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\a75d56ee7274b8953b3acec92cda228c2a722091e02297c80ea2d0cfa72d02f7.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2624
-