Resubmissions
06-12-2024 17:06
241206-vmsmlstlhl 106-12-2024 17:02
241206-vj5srstkgr 106-12-2024 16:57
241206-vglxwatjgl 306-12-2024 16:53
241206-vd4zaaxmfx 3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
Very safe stug hacks.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Very safe stug hacks.zip
Resource
win10v2004-20241007-en
General
-
Target
Very safe stug hacks.zip
-
Size
41KB
-
MD5
1df9a18b18332f153918030b7b516615
-
SHA1
6c42c62696616b72bbfc88a4be4ead57aa7bc503
-
SHA256
bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
-
SHA512
6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
SSDEEP
768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1928 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 1928 7zFM.exe Token: 35 1928 7zFM.exe Token: SeSecurityPrivilege 1928 7zFM.exe Token: SeRestorePrivilege 1648 7zG.exe Token: 35 1648 7zG.exe Token: SeSecurityPrivilege 1648 7zG.exe Token: SeSecurityPrivilege 1648 7zG.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1928 7zFM.exe 1928 7zFM.exe 1648 7zG.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Very safe stug hacks.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1928
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2892
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Videos\*\" -spe -an -ai#7zMap1530:770:7zEvent131931⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1648
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD538605a41eda691b378c8304bf914c777
SHA175f2667ccacce7c7947c186dca5029ffee720c01
SHA256f791bea6d653eddcaf8be57e45b698e75f105e28a20c50f519ad43a2b2e27b2a
SHA512d1876ebad38543260b3c4a2b83b69546da52b093f459890835ad02ea65ea712e91f40c5bf9ae0313fa2f4fec303cea2348c5272a4ac70088d1dbffb7d5163374
-
Filesize
34KB
MD50a76bd3e26768bba68aca3d210997069
SHA1753690994a18cf58ed0fe3749d16448b763047b8
SHA2569056b87f079861d1b0f041317d6415927d9ffb6498ce2530ff90fda69fa64e78
SHA51214408ea7f44bc365a58d7480fff9ea3b10fa21bfbd3363c6e30b74a4d4121677e20ce1108cce12c203f0760768aee1c1aa69b130e090c409f9a516ea02d70c49