Analysis
-
max time kernel
154s -
max time network
280s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-10-2024 15:36
Behavioral task
behavioral1
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222.rar
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
3 signatures
300 seconds
General
-
Target
NanoCore 1.2.2.0_Cracked By Alcatraz3222.rar
-
Size
5.8MB
-
MD5
c75744769bae7a3e7a4a1aec27673851
-
SHA1
56b0aa88b44c532be4975bc096cb8e4b9e7ecb49
-
SHA256
ceb348dfa61b34bebce021fa783b0afdb874ea7205f75e7fb42b01898439be75
-
SHA512
fa0c8d0b3adbb0bf11185b6c85f38c99421ef24ce55d94674e8d999c907f323a3eb0bcf711b60298e31db2958ebfa2dafad9d01cdf1e61251018ebd717934679
-
SSDEEP
98304:5S+zg4KC/4ObL3j/ZV2tKRcHhMBJcPpylijvjTZi1UBCFCX/IxCF+/h0k98nRDdj:51kC/40z3tKMrcByIT1B2zkA/Ck92thv
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 4720 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 4720 7zFM.exe Token: 35 4720 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 4720 7zFM.exe