Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 16:56
Behavioral task
behavioral1
Sample
meow (1).rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
meow (1).rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
meow/main.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
meow/main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
main.pyc
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
meow (1).rar
-
Size
17.7MB
-
MD5
7473797760ece39e3dbb2cb4d0a65e98
-
SHA1
4ca60b6dbef1c9c325baa36aa14b6bdb855c9f2d
-
SHA256
0e150f62793e6e0f17368d556a994ea1955db91d80dbc79c0ce22a3e80b52ab8
-
SHA512
2f0550894300dcdd9516528310a09b4c70ab1f21616c66bac21ac4328f130b6830204d6a88c01364338b3361f545b213a781dc343730d2d6ada89c190e606f06
-
SSDEEP
393216:VtoJpW2RaM/Kp4+W6B+j/1nXPkNBRx1csjxEooAA7VmCtHug/lgL2Xce:jxA/Kp1FojapvWoovVTH75
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 4564 7zFM.exe Token: 35 4564 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid Process 4564 7zFM.exe