Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 15:13
Static task
static1
windows7-x64
11 signatures
150 seconds
windows10-2004-x64
2 signatures
150 seconds
windows7-x64
3 signatures
150 seconds
windows10-2004-x64
2 signatures
150 seconds
Behavioral task
behavioral5
Sample
Filepass.txt
Resource
win7-20240729-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral6
Sample
Filepass.txt
Resource
win10v2004-20241007-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
-
Size
761KB
-
MD5
0171e5ac0ad0131d3232978521eb2f1e
-
SHA1
4a0d85deee727f468ccb831078b8a5b6b00d0cdb
-
SHA256
dd50c31d7a1bc0cede8ece67a18548f2351fb9c629cc5007172d32844fe72f26
-
SHA512
b7332dbe17f30493a01df9ee63c44c3e9be6e120d777bf59628e8d7d147bc0923bdbe53a150c661e273bd55018f9f499661c74be4a53c9b4be1866422e824fe2
-
SSDEEP
12288:3loqMjMj1gxdzWY3X9ecyeHwYo2FjUnEuAzFTJqLnScUUHV3rmdM+SsC8DtvhSHT:VoqhiiY3N0cweFjmEuwBoLSbKVwM+vCp
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 2444 7zFM.exe Token: 35 2444 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid Process 2444 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\@[email protected]"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2444