Analysis

  • max time kernel
    1337s
  • max time network
    1161s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-es
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-eslocale:es-esos:windows10-ltsc 2021-x64systemwindows
  • submitted
    09-12-2024 19:20

General

  • Target

    prank.zip

  • Size

    37.3MB

  • MD5

    3cfdf9542fe562cafa039b017b6c132c

  • SHA1

    401d3d1cf805acfeb8f54d93afb9003663eb463b

  • SHA256

    eee5148cf8a219e81c9330cc253677333c1b5de273593cbc86986ea0476f414f

  • SHA512

    d136a9ae181408413c15a1975abee60a34ea096f718ead6d2a7f1c8ddd0a2e057d0a80cc7e0282d11643439cb755bd184f62ec50241362dfe8c15ae520d07b6a

  • SSDEEP

    393216:LCyt8yLre34k1CPwDvt3uFRCH3dEVB399e0DG6fTKcY1ErSkTGEzADiyrcFuLtwa:LqH6fecYZKG/iyJe+4vfZ6

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\prank.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads