Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 18:46

General

  • Target

    LovelyCraftPistonTrap_Win64_v.0.1.zip

  • Size

    96.7MB

  • MD5

    9c0382e7ffb95e1368cbb001d7e2f2ea

  • SHA1

    3772667c6e327504b30b5abb2d129d60577ade43

  • SHA256

    4355ff63b7d79c659fa159a25f8f1d5d77ae0c2816f1e6e12241ef3e1d3a2443

  • SHA512

    6adb174c37ba9910d53074ec0136c180e8b86e62a76d35df65188ab2068641d9ab60458d8c8be24d6ba407b339909bae0ab4bb8fba90ba2f30acd1a4c28a0bbc

  • SSDEEP

    3145728:uIS8wrHUXPME/MhBoxnQA8H9JflfJGBwpg1Hx9U+dmQ:w8UUfME/MboxwdJflheHsdQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap_Win64_v.0.1.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads