Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 15:13

General

  • Target

  • Size

    761KB

  • MD5

    0171e5ac0ad0131d3232978521eb2f1e

  • SHA1

    4a0d85deee727f468ccb831078b8a5b6b00d0cdb

  • SHA256

    dd50c31d7a1bc0cede8ece67a18548f2351fb9c629cc5007172d32844fe72f26

  • SHA512

    b7332dbe17f30493a01df9ee63c44c3e9be6e120d777bf59628e8d7d147bc0923bdbe53a150c661e273bd55018f9f499661c74be4a53c9b4be1866422e824fe2

  • SSDEEP

    12288:3loqMjMj1gxdzWY3X9ecyeHwYo2FjUnEuAzFTJqLnScUUHV3rmdM+SsC8DtvhSHT:VoqhiiY3N0cweFjmEuwBoLSbKVwM+vCp

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\@[email protected]"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads