Overview
overview
10Static
static
1Urget Cont...on.zip
windows7-x64
1Urget Cont...on.zip
windows10-2004-x64
1Urget Cont...on.eml
windows7-x64
5Urget Cont...on.eml
windows10-2004-x64
3Urgent Con...df.exe
windows7-x64
10Urgent Con...df.exe
windows10-2004-x64
10email-html-2.txt
windows7-x64
1email-html-2.txt
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
0s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 14:20
Static task
static1
Behavioral task
behavioral1
Sample
Urget Contract Action.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Urget Contract Action.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Urget Contract Action.eml
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Urget Contract Action.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Urgent Contract Action.pdf.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Urgent Contract Action.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-html-2.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
email-html-2.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
email-plain-1.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
General
-
Target
Urget Contract Action.zip
-
Size
424KB
-
MD5
607104ec5c797bd46a0a6bc76bfac512
-
SHA1
d6c5562c2c63c5d164cf09ab8c829cf8d4ed1581
-
SHA256
137cfbc6611add95e7dd00247098efc9aa4b16771d62c20a5d149f2181da6d6c
-
SHA512
0fdd49b6939bcf281a2cbcd50ab53989864a498e37dbf0d55ebc8f2e1ec3ee14c41ec52c8828d99f1ca612d95a53f22d2c76c0d8aa219740f00a736d9573b0b2
-
SSDEEP
12288:ZUpblYhNXCaq0DXHyLoo4Re+Bo3KhiJeHMgV+awgp:ZUpblYDXZDXKFJ+BOKSi+5G
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1712 7zFM.exe Token: 35 1712 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 7zFM.exe