Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 21:22
Behavioral task
behavioral1
Sample
597261b0a241e06ac06a24107b6f161e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
597261b0a241e06ac06a24107b6f161e.exe
Resource
win10v2004-20231215-en
General
-
Target
597261b0a241e06ac06a24107b6f161e.exe
-
Size
296KB
-
MD5
597261b0a241e06ac06a24107b6f161e
-
SHA1
b612562d643d041736a11b1a65f16b500ad28c46
-
SHA256
60fbbe7ef2cddca2274d95fe300a0c9a718c12a48faccfbc5e0f93b5aec20965
-
SHA512
c3d613d4b91ee356d48da55234db067b588004c671558f77e75db182f6983a199657ec3da679be9e31ece25c74ae7afe34cefc0c228bdb73f701adcd20e215a8
-
SSDEEP
6144:WRT9A65pP1wlYgrN1y6V1X1RonMequ8+my5ET7zBhZy+Zdv7/2e:KA65XwlYgrHy6V17kr8+m73zXZyKR7Oe
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3520-0-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3520-1-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Eset\Nod\CurrentVersion\Info 597261b0a241e06ac06a24107b6f161e.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3520-1-0x0000000000400000-0x000000000049F000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1960 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe 3520 597261b0a241e06ac06a24107b6f161e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4960 3520 597261b0a241e06ac06a24107b6f161e.exe 91 PID 3520 wrote to memory of 4960 3520 597261b0a241e06ac06a24107b6f161e.exe 91 PID 3520 wrote to memory of 4960 3520 597261b0a241e06ac06a24107b6f161e.exe 91 PID 4960 wrote to memory of 384 4960 cmd.exe 93 PID 4960 wrote to memory of 384 4960 cmd.exe 93 PID 4960 wrote to memory of 384 4960 cmd.exe 93 PID 3520 wrote to memory of 1244 3520 597261b0a241e06ac06a24107b6f161e.exe 94 PID 3520 wrote to memory of 1244 3520 597261b0a241e06ac06a24107b6f161e.exe 94 PID 3520 wrote to memory of 1244 3520 597261b0a241e06ac06a24107b6f161e.exe 94 PID 1244 wrote to memory of 1960 1244 cmd.exe 96 PID 1244 wrote to memory of 1960 1244 cmd.exe 96 PID 1244 wrote to memory of 1960 1244 cmd.exe 96 PID 1244 wrote to memory of 2880 1244 cmd.exe 97 PID 1244 wrote to memory of 2880 1244 cmd.exe 97 PID 1244 wrote to memory of 2880 1244 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\597261b0a241e06ac06a24107b6f161e.exe"C:\Users\Admin\AppData\Local\Temp\597261b0a241e06ac06a24107b6f161e.exe"1⤵
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c SCHTASKS /delete /TN "ESET_AUTOID_HOUR" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /delete /TN "ESET_AUTOID_HOUR" /f3⤵PID:384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 2|del C:\Users\Admin\AppData\Local\Temp\597261~1.EXE2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del C:\Users\Admin\AppData\Local\Temp\597261~1.EXE"3⤵PID:2880
-
-