Analysis

  • max time kernel
    92s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 16:35

General

  • Target

    σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip

  • Size

    15.2MB

  • MD5

    362f49e97ced3a22a2feafc50cfa901b

  • SHA1

    ca6be4087d6c619f561eaf2332b304bc3d6a9520

  • SHA256

    9cc639b89556218cf878a591e4119f7d54de66381c5425df49b756862e17e6bb

  • SHA512

    868f62860e7a04589ef9bb34be73a6376d6fd63f01aa02b5c0db92daee0546dce9df6b48eb80fae452f2d06834c531bc6312cf46ce57f79b95b4fd2f549853f0

  • SSDEEP

    393216:C7WYlpUbi4e/avO/0Qx8uWs1OZzdEf8WjRrixQhP097hi:MdV/aE0uWlzdCN1P0phi

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2392

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads