Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09-01-2025 15:54
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit Crack.zip
Resource
win10v2004-20241007-en
32 signatures
150 seconds
Behavioral task
behavioral2
Sample
JJSploit Crack.zip
Resource
win10ltsc2021-20241211-en
2 signatures
150 seconds
General
-
Target
JJSploit Crack.zip
-
Size
56.5MB
-
MD5
2409d91e52e3ed4d5a1eb89b0f19f3a6
-
SHA1
b1986ad365de438a3333fb61528925340b801f67
-
SHA256
a078da52265b2ba4e13c6dee4f3eaac668c467462864515eed89df5690aedd0e
-
SHA512
154b51b36091b428ba901a7bc4b27f14ff4617ec7ea30e988ace7efc7f89e161e22434c12e62c3388655ee656a6f359ec74516f22c9a4f4fa55bb98c01948059
-
SSDEEP
786432:Z3py3HgxrHlvVlBPBAWbeBlbsrxJBc8054NmuPDZ3YaC+LEJd4a/7RHJVIXli7C4:W3H8HB71B1SBlbsrtPDZ3juHjF0XuC4
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3840 7zFM.exe Token: 35 3840 7zFM.exe Token: SeSecurityPrivilege 3840 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3840 7zFM.exe 3840 7zFM.exe