Analysis

  • max time kernel
    437s
  • max time network
    1156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 18:42

General

  • Target

    sample.zip

  • Size

    356KB

  • MD5

    ff09d3899b6864d91275010db132380b

  • SHA1

    35f7af67c95898ad2bf23b0e03efa4ff44012316

  • SHA256

    b003445bff3c74372984627698d00b1210ef6846cd94b1a0c3eaec78f48de0e3

  • SHA512

    7ddf184563125574194509900230aed67216c401c9777efc326e51403bafa55ca6c40807215f2fb4491b81725ec6d819d453402f69f49bae4fed16cac6b55f82

  • SSDEEP

    6144:pqXFIbKXyoc5NwK9RscAVGwNvb/Trn6yj14y0nj7IUto8u9iEOv7J1B47m7oQ/ps:p0FZcfweRscbwN7TrnV1Ij7f1YiEOVLW

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\sample.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4264

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads