Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15-11-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
autoit.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
autoit.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
sript.autoit
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
sript.autoit
Resource
win10v2004-20220901-en
General
-
Target
sript.autoit
-
Size
136KB
-
MD5
0bb6c9e676ac5a89004e97587a3ed419
-
SHA1
f619dcf92595c4541a36c04a11cb0c95fbaf602e
-
SHA256
7c3d215e085c842786240fd5aff5fe910c2409a2ce16ec2749193dde70ea33c2
-
SHA512
881c26d40389160f92e8f204e74a41ee3a8270942b7664192dfb5fc7bc2162586bb523af3cdc59f056f0ecad5f2f0404721ccc6c93e1c256beacbca89cddecb7
-
SSDEEP
768:H1+m35uj8ntK5uvphxBzOioA6uFcs6IR5o:V+mAYtK5uvRhFcs6Iro
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\autoit_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\autoit_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\autoit_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\autoit_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\autoit_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.autoit rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.autoit\ = "autoit_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\autoit_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1932 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 940 wrote to memory of 860 940 cmd.exe 29 PID 940 wrote to memory of 860 940 cmd.exe 29 PID 940 wrote to memory of 860 940 cmd.exe 29 PID 860 wrote to memory of 1932 860 rundll32.exe 30 PID 860 wrote to memory of 1932 860 rundll32.exe 30 PID 860 wrote to memory of 1932 860 rundll32.exe 30 PID 860 wrote to memory of 1932 860 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sript.autoit1⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sript.autoit2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sript.autoit"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1932
-
-