Analysis

  • max time kernel
    133s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/10/2024, 13:32

General

  • Target

    𓃗-❀#❀La-te-st-❀-Se-t-up-❀-Pas$-》》#❀9192❀#-𓃗.zip

  • Size

    23.7MB

  • MD5

    9457512e32524bc411c4898ee7dc4929

  • SHA1

    bf99a8b8479d174205fab8a6247ec53af3a150d5

  • SHA256

    741d6c7de4c7cc4631ddfc17026cf37f40c76b64962a8d2131924808c71f7cbd

  • SHA512

    e913557d4ade30b7fbabb173cadd42022e2d5f16a51cf006e8dd43f2797a018ff74a84adbfb9cf11efaed1653c8cef064c269cfa39b69255b9428cf586580aa1

  • SSDEEP

    393216:ZztJGmX15JNwhLt3AKRybrW4JE434pwk4uQyDjTedF0V4YFIfBulDr5SOFDle6sn:ZBJGKNwxiVTmnwj3+jC1fADtfFDle6sn

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\𓃗-❀#❀La-te-st-❀-Se-t-up-❀-Pas$-》》#❀9192❀#-𓃗.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2820

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads