Resubmissions
12/06/2024, 18:27
240612-w37l5syeqk 112/06/2024, 18:22
240612-wzxyjavdna 112/06/2024, 18:21
240612-wzfdgsvdld 112/06/2024, 18:11
240612-wskpmavble 112/06/2024, 18:08
240612-wqwdcayblj 112/06/2024, 17:59
240612-wkxzzstgqe 612/06/2024, 17:46
240612-wcqwpsxenr 1Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
MDE File Sample.zip
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
MDE File Sample.zip
Resource
win10v2004-20240508-en
General
-
Target
MDE File Sample.zip
-
Size
13.4MB
-
MD5
af951ddf49a1457e2b2351741b6fda6e
-
SHA1
8f8666f91f17f71213df3271a3b1433ce3f17ee1
-
SHA256
63be0d6e0b4a815bc11ff4488e3eab18cdaf825a2cad89a5ab1a4673d3bea662
-
SHA512
c33df70ea521854966fec7aff3fdbca0641a76eab3d0212443263fdc39aa717c141089b82aa950e822be4aaef40485f8ed18e16f8433723a3b1810777343c731
-
SSDEEP
196608:UbyepD2KEk8n/XFfnx0EmGQzMaPfcz0noHtJj2FGRtgXmV5BoNPo8uKLIMiqFC/k:g3SBt/cEmGQzMaXcztJyczyy8ujMgcN
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5020 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 5020 7zFM.exe Token: 35 5020 7zFM.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\MDE File Sample.zip"1⤵PID:224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3124,i,15721081447618313297,6839074028983272033,262144 --variations-seed-version --mojo-platform-channel-handle=4660 /prefetch:81⤵PID:1832
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:384
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5020