Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 23:38

General

  • Target

    Makala Executor.zip

  • Size

    4.2MB

  • MD5

    b3344291f83a0d1966f21d86c0b0ed03

  • SHA1

    874b0a39530f346d0b250c60ec35462d7af4a29b

  • SHA256

    7bdb19204fec2ec0addc3761372caef85894bacf999c6c2fe80c64eef3abd936

  • SHA512

    c0823d845a4bf451c89f351d91b1010868a91a20cf6d163e149cd4ac972d375ab1c98aef604870abae497ff5d9ea230942ffaabfa9629686f97bdf039cec0856

  • SSDEEP

    98304:v1Bi5yP86sIwKAC3tZQ3kvBQtdXSzQ1CgMOjmEBTnABTVpFAjOEWH6C1fZHn:e5yx7R3tZQLQJgBBrAtVpF5EW6C1tn

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Makala Executor.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.