Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 21:12
Behavioral task
behavioral1
Sample
008A2BD776CBBEAD90F92B4772720E26.exe
Resource
win7-20230712-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
008A2BD776CBBEAD90F92B4772720E26.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
008A2BD776CBBEAD90F92B4772720E26.exe
-
Size
1.9MB
-
MD5
008a2bd776cbbead90f92b4772720e26
-
SHA1
f7bd82c2ee4e7823e120a353a255621a71532116
-
SHA256
188e9c955d0516d7ec292dbc5451935a416b783e363397ee521a794ee90c67b4
-
SHA512
28985b54591b6d2c5aafd89ccc39966cc8f3a85588bcbf5b37a654aaa97535d2ffd1e978701690232fd5a24bec8c3bbf31f4fa2fd8928153980ba13485611dfe
-
SSDEEP
49152:JshdTEFIk5che75Pe82Bh7ghn62isMqNXfmW:P95CgPevB9gHisMqBN
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3764-133-0x0000000000AF0000-0x0000000000ED8000-memory.dmp upx behavioral2/memory/3764-226-0x0000000000AF0000-0x0000000000ED8000-memory.dmp upx behavioral2/memory/3764-229-0x0000000000AF0000-0x0000000000ED8000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3764-226-0x0000000000AF0000-0x0000000000ED8000-memory.dmp autoit_exe behavioral2/memory/3764-229-0x0000000000AF0000-0x0000000000ED8000-memory.dmp autoit_exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3764 008A2BD776CBBEAD90F92B4772720E26.exe 3764 008A2BD776CBBEAD90F92B4772720E26.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3764 008A2BD776CBBEAD90F92B4772720E26.exe