Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.pdf.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.pdf.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hesaphareketi-01.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
hesaphareketi-01.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
hesaphareketi-01.pdf.zip
-
Size
495KB
-
MD5
a480a74c2fcc268d9cd3ce49f2b15a24
-
SHA1
bb197409518c6ef2636c6dc2bdd0d53e9b59e9cb
-
SHA256
56b2e1e2a5936d3ca74a62ce4ba8763a60e1f0673477619f934db100ec42e2ea
-
SHA512
2ce8eb551ea3ca9ba2411efaffede14f254e27465f74f2ebb93d608facfc05bb7645ecdd02ccc77e9e8d77e5aaf439f57315118bdda6dd9cf36d1eef9d96852d
-
SSDEEP
12288:/hv+EnwKNOont/7Xi56/RwpSJlgULBmukv4Lo72IIVF:l+ewJExXi56/yuBmukCP
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3148 7zFM.exe Token: 35 3148 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3148 7zFM.exe