Analysis

  • max time kernel
    131s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 19:17

General

  • Target

    AutoDiscorder.zip

  • Size

    80.3MB

  • MD5

    9a689a63966b1e055c2a44eed335a089

  • SHA1

    70b63a3d1114de6a7dcfe3ce94c64a69aabc3b89

  • SHA256

    4134b245f9ba38dc81310242f42f8f8fc9b42865714d47f71cd87d5990a5ebc0

  • SHA512

    559c4e4333ff2262c0bdbbb96f42e7a639488e3ef22d4fa464f3a50b82a4ee5b639c8aabacc524dd202f6d6aa9bedd0557a91dba7cfe1a69de595cbd8efee3bb

  • SSDEEP

    1572864:Piu0OEM74FBNx2Ib4fR55OIiMv+8XzBZCY5iwmNCWmnsygRa3d58E:Piu0OEM7kBNrbk5OTQZmyW+sy1/8E

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\AutoDiscorder.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1508

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads