Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2023, 17:05

General

  • Target

    12e4688aa354c6ca82e0e2e5bd2d5adf70af1a2d28c7adae81cdff7af740acaa.exe

  • Size

    409KB

  • MD5

    bbdb414bcca234c72a3718895240a0f2

  • SHA1

    f2f0ef2295e0d23b004a7b6efcfc51b2dbd2bd33

  • SHA256

    12e4688aa354c6ca82e0e2e5bd2d5adf70af1a2d28c7adae81cdff7af740acaa

  • SHA512

    7230897b253794968cefc41e57ce0170b298ce45143b028477766944057b748a168a947bd37065e3d884250199fd71482cc72f12af234dbd1b411a4bf1b7a6f3

  • SSDEEP

    12288:H2JqnIO05081AU/0yxOOTnO1OzEl6vBvyTYc:WQIOcP6yxOOTBE8Bu

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12e4688aa354c6ca82e0e2e5bd2d5adf70af1a2d28c7adae81cdff7af740acaa.exe
    "C:\Users\Admin\AppData\Local\Temp\12e4688aa354c6ca82e0e2e5bd2d5adf70af1a2d28c7adae81cdff7af740acaa.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1692

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1692-54-0x000007FEFB9B1000-0x000007FEFB9B3000-memory.dmp

          Filesize

          8KB

        • memory/1692-55-0x0000000140000000-0x000000014010E000-memory.dmp

          Filesize

          1.1MB

        • memory/1692-56-0x0000000140000000-0x000000014010E000-memory.dmp

          Filesize

          1.1MB