Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 19:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
onliner.rar
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
onliner.rar
Resource
win10v2004-20240419-en
16 signatures
150 seconds
General
-
Target
onliner.rar
-
Size
113KB
-
MD5
f907febd6726494a99dc4fd6fc669448
-
SHA1
e982fd86405efc6f2b347c52a185ca7639468e19
-
SHA256
25b7225dfb6cd17920a41855fdf3a7ff58612070b3afe7cabc8a616ee21f5a1d
-
SHA512
cc246a793dcf9249f2a2058084ad1b5bd466440c9b0f814be7f640196d83fc75414096e665bbc2d0b28c4a99a97a73b5826c3d168a9e8f17566b490c2bd581fd
-
SSDEEP
3072:ZQOggRXmdbZU7wsWZ33TYSp11I9yweGmXEyTA6w68SYP90B+Q:Zn0ZU7wFXp12kwe3XvHiP90MQ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2516 7zFM.exe Token: 35 2516 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2516 2156 cmd.exe 29 PID 2156 wrote to memory of 2516 2156 cmd.exe 29 PID 2156 wrote to memory of 2516 2156 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\onliner.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\onliner.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2516
-