Analysis

  • max time kernel
    94s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 17:16

General

  • Target

    New folder (6).rar

  • Size

    6.1MB

  • MD5

    27b4dc830b401a9ef6a405b25f991c9c

  • SHA1

    960071c674b6d7c0066ccf4ab7d9fb31c958567a

  • SHA256

    c7258d057f5072211b50e9edcda0bf1d63b8285c4a463ff81ebbe036aa850862

  • SHA512

    f5ec58124c86ba3f67c8c86fa1899ee6eea3a27e4c46e59c3d997258af548a2e15cd7db5e23c6c89cf4fda2b555b38e7c69b66871e09fb2e0fdd5de5e75301dd

  • SSDEEP

    196608:1hIil4GQnWGqXX2eDUgfFlHNY6k8ak1u4:uGQWT2SJftY6khV4

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New folder (6).rar"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1896

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads