Analysis

  • max time kernel
    93s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 15:01

General

  • Target

    BasicAvatarGenerator-2.4.0.zip

  • Size

    70KB

  • MD5

    ba6c762f76afaa5781c5dd489f582798

  • SHA1

    ccbd8cedca7272ef61b8bc87d4f6861544993e98

  • SHA256

    fb36b7a37b85249ef993166f33ac6c0f33bbfdb6bbc0d7a0e4bdef00c531b605

  • SHA512

    81f8b66826d17541215f96e2a4958e2a087b705a73d18b541df92f03d0699c7c258708028fb13ec52464897296faa7c510c0593033e10dba176e0debafedfe7f

  • SSDEEP

    1536:UE1eu1pjaXG2pOn+472q0BBZkC3Tkk0XXTT+Y8GR:Xwu1EXrInpl0hDmiYX

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\BasicAvatarGenerator-2.4.0.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads