Analysis
-
max time kernel
151s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
Shipping_Document.gz
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Shipping_Document.gz
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Shipping documents 0000933349450065096000.exe
Resource
win7-20241010-en
General
-
Target
Shipping_Document.gz
-
Size
269KB
-
MD5
60c2a5a98e22e0af687412c587a587c8
-
SHA1
e90a2aac0bf8023ebd4ce15bf5228f1d85787e1e
-
SHA256
0c60371abbee8b8492c2a1fb853ab09633f35ee4026afa1e08474279cf3e1214
-
SHA512
061f66eb37166b2dc1d7b962c953f6a6cf7ca5323f71dea787e0e25fbcea56e3fa5c4dc3bb1146a16094064775dac5e4f41a23f6bcb82b4c482b1bdffa2ebbc9
-
SSDEEP
6144:oSoBSfeyMGc7qhfC0KrlVz99LyCOHqtmfWzNIkvKoNmJxmqa2QUSQVxPn8cly:olBAfcO0hlVz3WC5tmOz/vKolqQPsBNy
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 4748 7zFM.exe Token: 35 4748 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 4748 7zFM.exe