Analysis
-
max time kernel
92s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2023, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
AutoHotkey_1.1.31.01_setup.exe
Resource
win7-20230220-en
General
-
Target
AutoHotkey_1.1.31.01_setup.exe
-
Size
3.1MB
-
MD5
6e8269623d0006d81970039d22d126dd
-
SHA1
9055a01855dfe05fa40397b7c52a7046546494ea
-
SHA256
02d8d06690bdf036d8bb022c07dbde5d64ba2f05964dc888d9549f09917ee8ad
-
SHA512
421c489efd9d1d12a46f1a97abe2170403d6f57422521a0342e39cd63fb5be18899245f728b03c7cc278d58c127d76490292fdb20b436177c505012f4a6c77ce
-
SSDEEP
98304:XYFut33mq3vx3zi9EfW+1s2BAQJY/2xHuKOAvJ:X/R2CvxDi9CW+vJY/lKHx
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Executes dropped EXE 1 IoCs
pid Process 884 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 AutoHotkey_1.1.31.01_setup.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 884 setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 884 setup.exe 884 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 884 2040 AutoHotkey_1.1.31.01_setup.exe 28 PID 2040 wrote to memory of 884 2040 AutoHotkey_1.1.31.01_setup.exe 28 PID 2040 wrote to memory of 884 2040 AutoHotkey_1.1.31.01_setup.exe 28 PID 2040 wrote to memory of 884 2040 AutoHotkey_1.1.31.01_setup.exe 28 PID 2040 wrote to memory of 884 2040 AutoHotkey_1.1.31.01_setup.exe 28 PID 2040 wrote to memory of 884 2040 AutoHotkey_1.1.31.01_setup.exe 28 PID 2040 wrote to memory of 884 2040 AutoHotkey_1.1.31.01_setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.31.01_setup.exe"C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.31.01_setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\7zC06F37F8\setup.exeC:\Users\Admin\AppData\Local\Temp\7zC06F37F8\setup.exe2⤵
- Checks whether UAC is enabled
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
865KB
MD57fa7addf02eba311f4e83817a1315997
SHA1494f722a1359d93b5dc172a812277c418d782909
SHA25682acad7fc32a41a87ba622fc19255bb21724cf5541693d368e1cb53a265ffbda
SHA51262d6d9f7d2c50171d641eeb939a989e890a676cba5200fdf39454ed3de6a2476d7196d2a596bbdb47549b69dc4df14c8bcd0dc887bde93a58c110ef722d32f5e
-
Filesize
865KB
MD57fa7addf02eba311f4e83817a1315997
SHA1494f722a1359d93b5dc172a812277c418d782909
SHA25682acad7fc32a41a87ba622fc19255bb21724cf5541693d368e1cb53a265ffbda
SHA51262d6d9f7d2c50171d641eeb939a989e890a676cba5200fdf39454ed3de6a2476d7196d2a596bbdb47549b69dc4df14c8bcd0dc887bde93a58c110ef722d32f5e
-
Filesize
865KB
MD57fa7addf02eba311f4e83817a1315997
SHA1494f722a1359d93b5dc172a812277c418d782909
SHA25682acad7fc32a41a87ba622fc19255bb21724cf5541693d368e1cb53a265ffbda
SHA51262d6d9f7d2c50171d641eeb939a989e890a676cba5200fdf39454ed3de6a2476d7196d2a596bbdb47549b69dc4df14c8bcd0dc887bde93a58c110ef722d32f5e