Resubmissions

12/11/2024, 17:15

241112-vsl21swmbv 1

12/11/2024, 17:14

241112-vsb7taxdkr 1

12/11/2024, 17:09

241112-vn81zsxcpq 1

Analysis

  • max time kernel
    94s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2024, 17:09

General

  • Target

    eicarcom2.zip

  • Size

    308B

  • MD5

    e4968ef99266df7c9a1f0637d2389dab

  • SHA1

    bec1b52d350d721c7e22a6d4bb0a92909893a3ae

  • SHA256

    e1105070ba828007508566e28a2b8d4c65d192e9eaf3b7868382b7cae747b397

  • SHA512

    73d6b0ca9c5554fd2b37ff8af6b51812f3af49962cebd6e042d0883a45794ddb8a53724275d26f3e18cebf1cd1d67740acc920aba16965038c0cc75b87030fbe

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\eicarcom2.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3228

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads