Analysis

  • max time kernel
    94s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 03:10

General

  • Target

    Release.zip

  • Size

    30.0MB

  • MD5

    7b352f4b215d9505e5e1a898990c8658

  • SHA1

    a4cfc444f659a21582c144c4a99eeda75d1e343b

  • SHA256

    d7fc6e32096855a5f4d545f6359b1e0ce5b8ff3173c83ff1407423b0c6025bb0

  • SHA512

    e859cd4130537d0035f1a2b6265bfe91ec36355216f5851f81c0b6ec266a2dcb8bbc92879494e8b0b963f6bab830fc5ea98a9dbe717a3b38b5731d63948e0aad

  • SSDEEP

    786432:FnTe0UOYgy+hEJpfbIHJ0VJi209uBZOLHEk:FTi8y+hapjQ0VJLBZEEk

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Release.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1804

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads