Analysis

  • max time kernel
    0s
  • max time network
    1s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 16:30

General

  • Target

    script.zip

  • Size

    5.5MB

  • MD5

    d23f680812d614afae51436e43a7acbe

  • SHA1

    4906667187e56bc7242ba7540efc01e621e1399b

  • SHA256

    86ef1d24279e7eea5ecfefb4d8e605c78916e3d504ba4bb6dd86063159e50389

  • SHA512

    91148c0abac076a385b5afbb9e2e4927b0c1ad50d483ba84aca0cae8b0c4a16f5b17b75879a47afed893e9c1a3426f7138b1ac7ec7ec2f3908be224b76487626

  • SSDEEP

    98304:3u4FqHR5+l1tcINUfnffSDs4qgVpJb9139yDbcuvh7E5fZ4t93HNWTF9wmbJ8XgA:ei85s1tcICfiDs4ptcpyfCjt8F3bJ8XT

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\script.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2568

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads