Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 18:35

General

  • Target

    Femoral.tar

  • Size

    302KB

  • MD5

    2e7cf94619b29db1ee66cb7ad3b73e31

  • SHA1

    d07eac327a721a07c3f79de6850f5a1b039f37d6

  • SHA256

    69e737b3d045f74bd2afb7231f722c979936a9ecdd27abd007ff0b76be3d46f5

  • SHA512

    fd6bcacc56ba9572c5ba402e900cef7c461f47fb44a613f59ccf528793fdaa00b518b03daea1c8bfc4e96e1964e571a6fd6295bf73b46c37a80b01273871080e

  • SSDEEP

    6144:Q1aF84Jvxm32d5WIjO7aMLPWZSzr0at9bTbAh4epn+AF:uaF16mWzaMDzr9bbHAhXH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Femoral.tar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Femoral.tar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2784

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads