Analysis
-
max time kernel
302s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/10/2023, 04:48
Behavioral task
behavioral1
Sample
453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe
Resource
win10-20230915-en
General
-
Target
453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe
-
Size
432KB
-
MD5
c809843eb6a572e9a787b532f43b6613
-
SHA1
b53ad0bd44c8b19cb1ca371cfe5e865f2a90578a
-
SHA256
453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174
-
SHA512
ae277aaa3fe1e18862ea7482dc68dbcbd68a651d537d494ca884562280ab7bebb64b5ef4c84b5a94f79181b1d747de0cbde42c84190dc5db448cd70f82f10d0b
-
SSDEEP
12288:8z7hU5I5yuNHIgzSFKxWltRohBfSTso93UBC1f:8f+iN57Gtene3T1f
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2588-0-0x0000000000F50000-0x0000000001055000-memory.dmp upx behavioral1/memory/2588-1-0x0000000000F50000-0x0000000001055000-memory.dmp upx behavioral1/memory/2588-2-0x0000000000F50000-0x0000000001055000-memory.dmp upx behavioral1/memory/2588-24-0x0000000000F50000-0x0000000001055000-memory.dmp upx -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2588-1-0x0000000000F50000-0x0000000001055000-memory.dmp autoit_exe behavioral1/memory/2588-2-0x0000000000F50000-0x0000000001055000-memory.dmp autoit_exe behavioral1/memory/2588-24-0x0000000000F50000-0x0000000001055000-memory.dmp autoit_exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe 2588 453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe"C:\Users\Admin\AppData\Local\Temp\453ee6cc4b34499db593bc15093b0d6d18e4f6ca13f662e59cd97a80713f5174.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588