Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 07:13
Behavioral task
behavioral1
Sample
non prem.zip
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
non prem.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
non prem/noneprembrokeahnigga.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
non prem/noneprembrokeahnigga.exe
Resource
win10v2004-20241007-en
General
-
Target
non prem.zip
-
Size
24.1MB
-
MD5
fab4413d6c35391de67fbb890772cf70
-
SHA1
9b76cf00f5520e695c0a51e920c3f88b7c6ee9ae
-
SHA256
a87bae75302b2021b1f61d0f95a0b2d69d6744ac7a25b83ad8b4b94da65e1806
-
SHA512
d8f9b92bb2ddbe183d9720a56b11655a14c1197e2d935cb0f048ab1b4961ad61387a4b2a5875a41e22db82417d52a7e8d4b85bac2f47125373d878a530a114d8
-
SSDEEP
393216:1qPnLFXlrN7mH1y2DOxQDyRCDOETgs77cGwJMVgGNCFpWpLMUjfBoGteBlsS:sPLFXNRmH1y2OQDyFE7GJ+PcGSUmo9S
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 948 7zFM.exe Token: 35 948 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 7zFM.exe