Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
Mussu.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Mussu.zip
Resource
win10v2004-20241007-en
General
-
Target
Mussu.zip
-
Size
16.5MB
-
MD5
ebc28e01f24dba43a859200fb894aec1
-
SHA1
3410e083ad0a952961afdd8dfe17144fa1d67b4c
-
SHA256
7322d721bf1f0d3605afed4f865595141cc06a2ce96b2aaa68b8fffdb282cd0f
-
SHA512
8ade27a7e862799effcf4010993b3f774eead684ca724d206773a6d20743636f03d9e07897f0bc938ddb97dcfdb165b018645672c716e4a37fa849cfe86e0e21
-
SSDEEP
393216:cC+UQFs/q/zi0CvxynQzueshfscw2EBIM0ogPyw3gq:coms/azXnQcZwlBIM0ogPh3gq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
BraveBrowser.exepid process 4948 BraveBrowser.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\BraveBrowser.exe themida behavioral2/memory/4948-4-0x00007FF6E9CE0000-0x00007FF6EB4BE000-memory.dmp themida -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 3916 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 3916 7zFM.exe Token: 35 3916 7zFM.exe Token: SeSecurityPrivilege 3916 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid process 3916 7zFM.exe 3916 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Mussu.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3916
-
C:\Users\Admin\Desktop\BraveBrowser.exe"C:\Users\Admin\Desktop\BraveBrowser.exe"1⤵
- Executes dropped EXE
PID:4948
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.0MB
MD589e53d5098cdd2dc6a71ca41236844d1
SHA1b67cac83578cb28082a40b3d16adee8f2b4ab9b4
SHA25662c9b8ba6a0eca0cd348724b5b3a9cfac8e25dcb4b16d6f817c5a97651beaa08
SHA5124b0a4f6d71b38c55324c7325c3c24f18dc2559ba7595bcb47a70540b64a596c407466a00df2f2026a0e13169a3863fbbc833639e05ec6fbcb54a89a2de059527