Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 16:44

General

  • Target

    FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-105.zip

  • Size

    656KB

  • MD5

    b6d1363e20121cb9774242802f35d62a

  • SHA1

    262516a9be2e71425270aab9ce3a358b652f2346

  • SHA256

    420d6a8ae38b7f50100a315d65817df53c702e5940ef340cd99540cb1157f258

  • SHA512

    4ffc1f2311ea2a41f3ff396cb6ec9e03d1b6926193a9bcdb9541d89a5c5f6715b51a3aaae9a34012622ba030437e4e1c365cdad6383dec65016d04efa8f8c0d3

  • SSDEEP

    12288:UgFhN8l2knErvyzB0cse40SqsMXfNaIsGPxf/JCWVaovv1DSSP23E7z:UgeDncazBZse40zsisi33X1DSGgE7z

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FACTURAS ADVISES-AIRE\CON ACEPTACION TACITA\FE-105.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads