Analysis
-
max time kernel
138s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 07:56
Behavioral task
behavioral1
Sample
4051186f9993afdd64aa7e50327de6ce.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4051186f9993afdd64aa7e50327de6ce.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
4051186f9993afdd64aa7e50327de6ce.exe
-
Size
837KB
-
MD5
4051186f9993afdd64aa7e50327de6ce
-
SHA1
f9122d5c1f40d94a655f8370cefb5bf14088858d
-
SHA256
f882bfe114a6238e066fd0da5cd9cba83a47947e32c5f17c8360f28698965843
-
SHA512
8a4715cb6a8ce2f5832086bd0fb75de30db1a5b7cc28035e459c147bdb121011df1afb14a799fec036a3621b9e8e15724381e32891d6fdb2f654fc011d0cb691
-
SSDEEP
24576:IcRToImoAFF7iyqgijMEwXJInJC5mRLvub0Rs:lRMIuviyq7jMEwWJC5CvuoRs
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3552-0-0x0000000000400000-0x00000000005AE000-memory.dmp upx behavioral2/memory/3552-1-0x0000000000400000-0x00000000005AE000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3552-1-0x0000000000400000-0x00000000005AE000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe 3552 4051186f9993afdd64aa7e50327de6ce.exe