Analysis

  • max time kernel
    93s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 15:03

General

  • Target

    New folder.rar

  • Size

    3.1MB

  • MD5

    0f7e60c821d2fec96a19bf6278444ff6

  • SHA1

    ae0aeae53a8df4c5bd7f742812e2e0478cead4e1

  • SHA256

    085547a82141160dbab3f8d0b861dd506afd9b8c9b414d3506606f0d3c17a278

  • SHA512

    71681734b8d908b3346739848854c4950a2b6105ec1309495520eda3b3bc2c1bbcc866e98fd9f97a1c0ed6540add10c307f6888cf8d32f21d62725af68c9bd03

  • SSDEEP

    49152:peQMaLXbjNhLFnY0jCFwKq6C1A6VWc13mIL0e2Zc01eq5r8kIqAnPbihxh:pNMeY0m5YFVvFmc0e1Pq5dIrj4xh

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New folder.rar"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads