Analysis

  • max time kernel
    92s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 16:35

General

  • Target

    σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip

  • Size

    15.2MB

  • MD5

    725813ffbad99757742c0e0758e5a645

  • SHA1

    314f87de8331e988f2430be0b2937e90d821c212

  • SHA256

    a6d5559e3539bef714539378b7ef72a6231615c3b008009f896ad9c0f6131374

  • SHA512

    66802cbb850398980d35d4162dc7abf4cc3e463d28b462bc9224e553a2ce65217a5dfb8329b7f761d635f264a139784121b3afe8939020ff914d5ce2f4138929

  • SSDEEP

    393216:0r8ndxvQnt2SdSXQVmSlOiOY5uv3t0ryaTRLcn4h30dF/q:q8QdSqoiOH3t+Z730r/q

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads