Resubmissions
02-02-2025 02:35
250202-c21mnatkcq 1002-02-2025 02:32
250202-c1ezka1ngt 1002-02-2025 02:21
250202-ctafhasqbl 10Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 02:35
Static task
static1
Behavioral task
behavioral1
Sample
NebulaExecutor.rar
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
NebulaExecutor.rar
Resource
win10v2004-20250129-en
windows10-2004-x64
16 signatures
150 seconds
General
-
Target
NebulaExecutor.rar
-
Size
27KB
-
MD5
f44ba3369f118e9cc2611886494cc3f8
-
SHA1
ecfcbd5f3149762e00298980c79137ee3299be3a
-
SHA256
b6c7009dd8b089a584aeb6ba37fb75c11a415d63512347beece251e69da5c63b
-
SHA512
b31cd82c9c490e5dc0358459e7d81f12e2ba4ca092d71e27d078d740475fc5857e758b1c3e3996e69ee989bcf21e0acde9c6eeaaba6f30c9f1ea1bcb1eb3cac1
-
SSDEEP
768:2/Dgm33+7HbJRN4FnxT+nugwNwlG+sbiVTRsn:1Ou7Hbh4Ftou9zfbmRu
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2132 7zFM.exe Token: 35 2132 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 7zFM.exe