Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-de -
resource tags
arch:x64arch:x86image:win7-20241010-delocale:de-deos:windows7-x64systemwindows -
submitted
05-12-2024 03:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VixenExternal.rar
Resource
win7-20241010-de
windows7-x64
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
VixenExternal.rar
Resource
win10v2004-20241007-de
windows10-2004-x64
34 signatures
300 seconds
Errors
Reason
Machine shutdown
General
-
Target
VixenExternal.rar
-
Size
43.8MB
-
MD5
7d4d5a3200b1cb366e53699bf7b5d7f8
-
SHA1
9f1f9966839d2e560705b1c7af95b8a9f611ca3b
-
SHA256
60a60aa74911af0c1d4e093605bb5835e9877c33a5b057aea4a55d45462c9145
-
SHA512
4d74e4d80984905950212b2177c06824568a1a5a133e9a482f96cd9bf56bbefa452a3229ca5bb3cd9cc2d87b74f7677054a286444bfb7c356ff3319ac142b8b9
-
SSDEEP
786432:ZgYA776WycvrwE3SBu96FowofcWIz5gmvO8p2mj8j6ZIjTPBvmRnFvdnVjRUCDh9:ZcSWLDwE3OFowoUFzSR8Fw+IfMmchBkA
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2320 7zFM.exe Token: 35 2320 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\VixenExternal.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2320
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2756
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2412