Analysis
-
max time kernel
99s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-12-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
FILE_ID.diz
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Password.HERE.jpg
Resource
win10ltsc2021-20241023-en
General
-
Target
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
-
Size
7.2MB
-
MD5
d8921169fee349f9e70a294901d59ffb
-
SHA1
cf45c1d9b230ed7464596c24b8db099fe6cc9359
-
SHA256
af66ad74e9a3367191ad63919581995407706f28c45d8379f50da494ff724fd5
-
SHA512
b0c16d4b7b22361b70d94135a65d0284367791f3919237d2abd90688393f4378133baa4e88cafec3ebf9c467596019088b26931a971475e6c27ebee4742c63ec
-
SSDEEP
196608:FIeZHNhnaNOgD0rNWfu1LwGxLlrkoaAsHpS:FIeZHNhu0rggdxLZNug
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3052 7zFM.exe Token: 35 3052 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 7zFM.exe