Analysis

  • max time kernel
    144s
  • max time network
    164s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    21-12-2024 17:41

General

  • Target

    $PLUGINSDIR/app-64.7z

  • Size

    432.9MB

  • MD5

    5f2267e8bd459cfa165dae42f5395847

  • SHA1

    bf1a0ec478b937f1aeded5947d9b8cf8f6042fdf

  • SHA256

    e39b418ba9a570b9fa75f3f72358bb42e282ea90e209a949a1f352692c081136

  • SHA512

    58e5e8423b307ad8fcf01ec69ff30db6419fde78a4500a2c504a8077fab5ff1b8bc258f4209ade8dcacce701816e7c1cb911f8fb242c5390ea73f568fc6cdadb

  • SSDEEP

    6291456:GwJrJjKCo0uBPUNFHZHFQUIt3WvRPwrL9FD/BYYDuIE34v7ndZB93lPlf:3rE0uc7FSt3WJPwv9FDvTPd

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads