Analysis
-
max time kernel
363s -
max time network
365s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
illil.zip
Resource
win7-20240903-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
illil.zip
Resource
win10v2004-20241007-en
8 signatures
150 seconds
General
-
Target
illil.zip
-
Size
152B
-
MD5
a392d3ea1273190dac1c392ea3742e66
-
SHA1
7cb70c753b59b36657eb4c2d4aef0168fccedb2e
-
SHA256
7d4c8704094207a1cb9a3a6fd9abb5130a05c718e6fbf47179a89d045bd25852
-
SHA512
e590f80e3bfb7a89773e5e261f8552eb12ce632c540cfbc5ff505ff36e20bac34f672337c471d7b05f897ee85fd65e147ea2c63ecfa5208b6753ad2a54372123
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico 7zFM.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2280 7zFM.exe 2756 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2280 7zFM.exe Token: 35 2280 7zFM.exe Token: SeSecurityPrivilege 2280 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2280 7zFM.exe 2280 7zFM.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 AcroRd32.exe 2756 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2756 2280 7zFM.exe 32 PID 2280 wrote to memory of 2756 2280 7zFM.exe 32 PID 2280 wrote to memory of 2756 2280 7zFM.exe 32 PID 2280 wrote to memory of 2756 2280 7zFM.exe 32
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\illil.zip"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7zO8E87679A\illil.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2756
-