Resubmissions

04-12-2024 04:28

241204-e3ta3sxlep 1

04-12-2024 03:02

241204-djgmhatpdm 1

04-12-2024 02:46

241204-c9ep6axpg1 10

Analysis

  • max time kernel
    98s
  • max time network
    155s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    04-12-2024 02:46

General

  • Target

    yyy.zip

  • Size

    2.8MB

  • MD5

    a9cb224f62e40601a10af5824a331248

  • SHA1

    1ce3c4fdedf57af3994b4625d43304861a3e13ec

  • SHA256

    c0adaa84600a272780e9937a647329dca67e6c004f5b58098139af09fc2e7b1c

  • SHA512

    269182c309bdfaae0878708bf539db4cebba8e5c09a528b54c89c1a5a80771e53bf1e8d0b9b5952e3c2ae2906600a4929014dba501f973c01f9652bd78cbd564

  • SSDEEP

    49152:Ylz3lEDThXBJOhHcx6J6h2SFFGf0RBNTQfYc9jh23eWeB3/YSBm7WIqRpykTS098:aGFXamhRFY89YYc9jh23redpmQRl1ZGv

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\yyy.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads