Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 16:43
Behavioral task
behavioral1
Sample
Ransomware tool pack.zip
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Ransomware tool pack.zip
Resource
win10v2004-20241007-en
34 signatures
150 seconds
General
-
Target
Ransomware tool pack.zip
-
Size
308.1MB
-
MD5
27ddde20723c9509baed52cd5a152859
-
SHA1
f3dac2e94887499ee4c08b4c5fad469b79616634
-
SHA256
92e603c1a66049a7a665188ecc3c161b916ba8663bc00893281d04997d701f95
-
SHA512
25e5aa10ed609f217cbfdd67c133f9bb084b2d3928b4a6a34136b668c60ef120313c3a6a04406b71b26bdfc07c65e7de86a3fd1670de82eca403f2855122d273
-
SSDEEP
6291456:zMVAM35Xw9SyxlbFkMi1YckafrOs+wE9a63HMoOr3oVJzJWlsmyNHV8:YVJXgSyxlbFO1YckMy3pJOCz3T18
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2300 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2300 7zFM.exe Token: 35 2300 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 7zFM.exe