Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 15:43
Static task
static1
Behavioral task
behavioral1
Sample
Autoit3.exe.7z
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Autoit3.exe.7z
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Autoit3.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Autoit3.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
batch.bat
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
batch.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
ymehvz.au3
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
ymehvz.au3
Resource
win10v2004-20230915-en
General
-
Target
batch.bat
-
Size
23B
-
MD5
40dd37d010c3bdeff0c029f9d156c9e5
-
SHA1
7f3ff18c81629b684b7c3fc269ce7245bc181bc7
-
SHA256
603a9c0a9dc1bccf02d4021b4ea9d5cbc63d89b0bd0dd29b04f6faced8b7da42
-
SHA512
e9530af1a60b0ee4d691202495a743db5e6e544454289c3b2d7fde5043bfdfbcdf7a5a7584f95c0f857912ad66d3a483b190559a15a28cd5125ce9161ad31661
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Autoit3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 5044 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2928 wrote to memory of 4836 2928 cmd.exe Autoit3.exe PID 2928 wrote to memory of 4836 2928 cmd.exe Autoit3.exe PID 2928 wrote to memory of 4836 2928 cmd.exe Autoit3.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\batch.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Autoit3.exeAutoit3.exe ymehvz.au32⤵
- Checks processor information in registry
PID:4836
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD51ddcfa52d781f75190c18c48e9645b63
SHA1e2976a957580fde87caa6dd615e01a574292b564
SHA2561f77719d1f2ffee980d89e74904859e7d098ac1f7d1d09a0e406b1a4a1f8e23c
SHA5127882772319b3a801b72ebfad7674c35f43261f9f7aa0b163e49da0d898090ca1380db5b209b6263889a1180c68bd75ac6d53fb0fbaeebfca96f167f51a607afb