Analysis

  • max time kernel
    21s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2025 05:38

General

  • Target

    sample.tar

  • Size

    6.8MB

  • MD5

    0dafc97918235429b5f61693a4b07c75

  • SHA1

    e9088b9e704f491e69ea5f43b3cf23218407ced7

  • SHA256

    80296f96f441ae50c626a68a585c76a1da42c690fdc5dda92a6b98501b8bd499

  • SHA512

    674abe9a3995d54f2c0a8bfa6979d7b481bbc5aaa0eec1988b913e70df8f6b16be59eafdbb013cefec964cd8762606ff761e02811ad66f1d5d9904c3874aea50

  • SSDEEP

    49152:iVrV7/4s9R/FhdotBjtp5kU359UKnVTOmXtrVi/qE37M45w63GKDVHsSvU2DXeim:kiAvmDZPPXtw3ZWYVVy1LlYbmd

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\sample.tar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2296

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads