Analysis

  • max time kernel
    92s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 13:19

General

  • Target

    AutoHotkey_1.1.31.01_setup.exe

  • Size

    3.1MB

  • MD5

    6e8269623d0006d81970039d22d126dd

  • SHA1

    9055a01855dfe05fa40397b7c52a7046546494ea

  • SHA256

    02d8d06690bdf036d8bb022c07dbde5d64ba2f05964dc888d9549f09917ee8ad

  • SHA512

    421c489efd9d1d12a46f1a97abe2170403d6f57422521a0342e39cd63fb5be18899245f728b03c7cc278d58c127d76490292fdb20b436177c505012f4a6c77ce

  • SSDEEP

    98304:XYFut33mq3vx3zi9EfW+1s2BAQJY/2xHuKOAvJ:X/R2CvxDi9CW+vJY/lKHx

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.31.01_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.31.01_setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\7zC06F37F8\setup.exe
      C:\Users\Admin\AppData\Local\Temp\7zC06F37F8\setup.exe
      2⤵
      • Checks whether UAC is enabled
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zC06F37F8\setup.exe

    Filesize

    865KB

    MD5

    7fa7addf02eba311f4e83817a1315997

    SHA1

    494f722a1359d93b5dc172a812277c418d782909

    SHA256

    82acad7fc32a41a87ba622fc19255bb21724cf5541693d368e1cb53a265ffbda

    SHA512

    62d6d9f7d2c50171d641eeb939a989e890a676cba5200fdf39454ed3de6a2476d7196d2a596bbdb47549b69dc4df14c8bcd0dc887bde93a58c110ef722d32f5e

  • C:\Users\Admin\AppData\Local\Temp\7zC06F37F8\setup.exe

    Filesize

    865KB

    MD5

    7fa7addf02eba311f4e83817a1315997

    SHA1

    494f722a1359d93b5dc172a812277c418d782909

    SHA256

    82acad7fc32a41a87ba622fc19255bb21724cf5541693d368e1cb53a265ffbda

    SHA512

    62d6d9f7d2c50171d641eeb939a989e890a676cba5200fdf39454ed3de6a2476d7196d2a596bbdb47549b69dc4df14c8bcd0dc887bde93a58c110ef722d32f5e

  • \Users\Admin\AppData\Local\Temp\7zC06F37F8\setup.exe

    Filesize

    865KB

    MD5

    7fa7addf02eba311f4e83817a1315997

    SHA1

    494f722a1359d93b5dc172a812277c418d782909

    SHA256

    82acad7fc32a41a87ba622fc19255bb21724cf5541693d368e1cb53a265ffbda

    SHA512

    62d6d9f7d2c50171d641eeb939a989e890a676cba5200fdf39454ed3de6a2476d7196d2a596bbdb47549b69dc4df14c8bcd0dc887bde93a58c110ef722d32f5e

  • memory/884-104-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB