Analysis

  • max time kernel
    302s
  • max time network
    306s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 12:42

General

  • Target

    eicarcom2.zip

  • Size

    308B

  • MD5

    e4968ef99266df7c9a1f0637d2389dab

  • SHA1

    bec1b52d350d721c7e22a6d4bb0a92909893a3ae

  • SHA256

    e1105070ba828007508566e28a2b8d4c65d192e9eaf3b7868382b7cae747b397

  • SHA512

    73d6b0ca9c5554fd2b37ff8af6b51812f3af49962cebd6e042d0883a45794ddb8a53724275d26f3e18cebf1cd1d67740acc920aba16965038c0cc75b87030fbe

Score
1/10

Malware Config

Signatures

  • EICAR Anti-Malware test file 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\eicarcom2.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zOCE4B0DD7\eicar.com

    Filesize

    68B

    MD5

    44d88612fea8a8f36de82e1278abb02f

    SHA1

    3395856ce81f2b7382dee72602f798b642f14140

    SHA256

    275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f

    SHA512

    cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab