Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 18:49

General

  • Target

    S0FTWARE.zip

  • Size

    152.1MB

  • MD5

    c4e6c468339dec6f0a3129bb418de4e8

  • SHA1

    da45658d7c47c66e825436896cb157294d9c0419

  • SHA256

    d213b75523db2e3678178d0cb992aa0a1a6e0b7378578e638160b9bf30d23815

  • SHA512

    d4a0e2361b879095033d5345b167b134da868ad6cffc7c447cad2844e9d42f7c212d0f1a79dcb523870ef24c20f4c5c39873203319ac7f02d8d498bdbb36653d

  • SSDEEP

    3145728:m1cZZPJb63kzIvNI9Wt2ij4Hv8j9oe2APzKqMbplU0weB/FoEIEQOjYDLxJJ:kAZPJbIkzIVIjij4HeorAPzdMvUd6h3k

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\S0FTWARE.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2616
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2532

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads