Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 01:27
Behavioral task
behavioral1
Sample
e3f6c77fb793b397f639d83841da0dd0221ac3b10e3b8a77e51388ffd9d5049a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e3f6c77fb793b397f639d83841da0dd0221ac3b10e3b8a77e51388ffd9d5049a.exe
Resource
win10v2004-20230831-en
General
-
Target
e3f6c77fb793b397f639d83841da0dd0221ac3b10e3b8a77e51388ffd9d5049a.exe
-
Size
370KB
-
MD5
65f31914db3f9014aa7fb4190f10ddc4
-
SHA1
28919c49e49640736a6592b1bbd19b2c70bb3f16
-
SHA256
e3f6c77fb793b397f639d83841da0dd0221ac3b10e3b8a77e51388ffd9d5049a
-
SHA512
c8bb47a7f5a00fd164cc8f562c5d33d9ddd88cdc8a560faaa83fb542867d99125f89f28d2d0a9c5e31e269e0647712b993a734585efd26466eb3e12c17e89221
-
SSDEEP
6144:g+ssXv5jUA2OpjesAOfoTb+v+90TveVBciZnbCUxP4C9tgf/AN1LtdReCBJJKKrZ:qOv5jKhsfoPA+yeVKUCUxP4C902bdRtF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4720-0-0x0000000000070000-0x000000000015B000-memory.dmp upx behavioral2/memory/4720-4-0x0000000000070000-0x000000000015B000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4720-4-0x0000000000070000-0x000000000015B000-memory.dmp autoit_exe