Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 06:14
Static task
static1
Behavioral task
behavioral1
Sample
329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe
Resource
win10v2004-20220414-en
General
-
Target
329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe
-
Size
457KB
-
MD5
5bd74b4326c0856b12e380c8e89fa866
-
SHA1
9a4f5f82ecd275118d2d6bd3ad565e3e2519c1b5
-
SHA256
329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01
-
SHA512
cac848287c56b411258f3a8ba24c51da219662ddc1cea7fad482356f405b27edd41978d00d0674276f61cb6732431723cb41ee28d2375d12c67c3c9b97d247c0
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/824-55-0x0000000000980000-0x0000000000A95000-memory.dmp upx behavioral1/memory/824-56-0x0000000000980000-0x0000000000A95000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/824-55-0x0000000000980000-0x0000000000A95000-memory.dmp autoit_exe behavioral1/memory/824-56-0x0000000000980000-0x0000000000A95000-memory.dmp autoit_exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exepid Process 824 329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe 824 329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe 824 329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exepid Process 824 329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe 824 329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe 824 329009d1bb983cd18a393f5bd8eef12c630db241414babb998d96c52e151ed01.exe