Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 18:47
Behavioral task
behavioral1
Sample
5738d01bf1ce96c31dfcf834685fefab.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
5738d01bf1ce96c31dfcf834685fefab.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
5738d01bf1ce96c31dfcf834685fefab.exe
-
Size
2.9MB
-
MD5
5738d01bf1ce96c31dfcf834685fefab
-
SHA1
95cf2eb636b63b93a620fc698dfb9f3811711b17
-
SHA256
90ad1f14abe59a1e20de55b411aab7ded4e87a3c8c115a8420bd95de5c97ae53
-
SHA512
b96f514aa8b8526129ddc04e7eb607c1549d09b1ba1b1ce0c342c1fcdf5108056e48b26f3ebc092c316785a7ab6badf19b5f934f3e7f3a9c3a9985fcbf0e94d9
-
SSDEEP
49152:ah+ZkldoPK/YFvLCH9pP9JrI5B1/fIqJbWtTjGiONEr:z2cPKAohJkp/mtTj/j
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3556-0-0x0000000000B20000-0x0000000000E10000-memory.dmp upx behavioral2/memory/3556-18-0x0000000000B20000-0x0000000000E10000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\u: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\w: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\y: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\x: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\e: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\g: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\i: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\o: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\q: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\t: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\r: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\a: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\h: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\k: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\l: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\n: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\p: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\j: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\m: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\s: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\v: 5738d01bf1ce96c31dfcf834685fefab.exe File opened (read-only) \??\z: 5738d01bf1ce96c31dfcf834685fefab.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3556-0-0x0000000000B20000-0x0000000000E10000-memory.dmp autoit_exe behavioral2/memory/3556-18-0x0000000000B20000-0x0000000000E10000-memory.dmp autoit_exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3556 5738d01bf1ce96c31dfcf834685fefab.exe 3556 5738d01bf1ce96c31dfcf834685fefab.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3556 5738d01bf1ce96c31dfcf834685fefab.exe