Analysis

  • max time kernel
    1365s
  • max time network
    1446s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    16-11-2024 18:09

General

  • Target

    Triage.zip

  • Size

    19.6MB

  • MD5

    413bcfed31400918f62416617805606f

  • SHA1

    b9366d07b5715f1be51645f3ff5499458ddfaa90

  • SHA256

    cedef524b310863d014742266add69204464f9ef7b5daac8b8253160195bc66b

  • SHA512

    3122d976f67c8a89191f92d9413f36f311fad2d68a518bbc9de0f70cee32c6ba7a5a6b7d0a2b3d948471ff2c7de734d8326db24fedd8e80200852809c1d70cda

  • SSDEEP

    393216:gBkS7T+RGQPhXBkS7T+RGQPhkBkS7T+RGQPhZBkS7T+RGQPh2BkS7T+RGQPhh:gBk2ctBk2cKBk2cDBk2cQBk2cf

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Triage.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads