Analysis

  • max time kernel
    136s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 14:07

General

  • Target

    data/appInfo/services/01.rar

  • Size

    5.6MB

  • MD5

    5377db404fce684c13e14f5e22e2ffcb

  • SHA1

    f23129fba59eec620cef0b5277dcce066f515ca5

  • SHA256

    8abec78570a9d71983a87f8f82e50d9e6a2ccd56e39d144b8eda2ffe09a58e6e

  • SHA512

    059dac872c1c8d65842b91359a7b840e85e14061f32aacdba0de3e968945bf5d8a36e7184c7c28f10f5fc5ee9a650ab49e61b9554a211123174401294190e04d

  • SSDEEP

    98304:j8U/vV7msoYsIN8uoZ379w+QG0jcSN/seiZaPdkGW1vZj9GiOuq3JdQ:w4YYs88uoxJw+70jck5dkjBcZy

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\data\appInfo\services\01.rar"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads