Analysis
-
max time kernel
1337s -
max time network
1161s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-es -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-eslocale:es-esos:windows10-ltsc 2021-x64systemwindows -
submitted
09-12-2024 19:20
Behavioral task
behavioral1
Sample
prank.zip
Resource
win10ltsc2021-20241023-es
windows10-ltsc 2021-x64
2 signatures
1800 seconds
General
-
Target
prank.zip
-
Size
37.3MB
-
MD5
3cfdf9542fe562cafa039b017b6c132c
-
SHA1
401d3d1cf805acfeb8f54d93afb9003663eb463b
-
SHA256
eee5148cf8a219e81c9330cc253677333c1b5de273593cbc86986ea0476f414f
-
SHA512
d136a9ae181408413c15a1975abee60a34ea096f718ead6d2a7f1c8ddd0a2e057d0a80cc7e0282d11643439cb755bd184f62ec50241362dfe8c15ae520d07b6a
-
SSDEEP
393216:LCyt8yLre34k1CPwDvt3uFRCH3dEVB399e0DG6fTKcY1ErSkTGEzADiyrcFuLtwa:LqH6fecYZKG/iyJe+4vfZ6
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1648 7zFM.exe Token: 35 1648 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 7zFM.exe