Analysis

  • max time kernel
    179s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2024 13:04

General

  • Target

    013c86c9eb7691e645d32336f93e0374552ed3b1674bbf3f7217c765db3bfb51.exe

  • Size

    1.3MB

  • MD5

    1f6fdfe6fb0fcda923b6b07c555234d5

  • SHA1

    6f7af4cd953a3711da734b178b73c1772410cd6c

  • SHA256

    013c86c9eb7691e645d32336f93e0374552ed3b1674bbf3f7217c765db3bfb51

  • SHA512

    de4935455ec3d29f5b9928d9d692fc9fd79e457655cc2096178343919f9c61394c1e3c3565bf5917a9cfebd667fcf65105b0965c72fe8e755f3f9ba3b707b0af

  • SSDEEP

    24576:Xtb20pkaCqT5TBWgNQ7adzRSvUBdEj1Lsr6A:UVg5tQ7adNZc1e5

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 2 IoCs
  • AutoIT Executable 20 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 47 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\013c86c9eb7691e645d32336f93e0374552ed3b1674bbf3f7217c765db3bfb51.exe
    "C:\Users\Admin\AppData\Local\Temp\013c86c9eb7691e645d32336f93e0374552ed3b1674bbf3f7217c765db3bfb51.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
      "C:\Users\Admin\AppData\Local\Temp\013c86c9eb7691e645d32336f93e0374552ed3b1674bbf3f7217c765db3bfb51.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
        "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
          "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
            "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2108
            • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
              "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1504
              • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2528
                • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                  "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:1524
                  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                    "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:2332
                    • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                      "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:1896
                      • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                        "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:1292
                        • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                          "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:1508
                          • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                            "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:1232
                            • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                              "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of WriteProcessMemory
                              PID:2120
                              • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                                "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of WriteProcessMemory
                                PID:2880
                                • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                                  "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of WriteProcessMemory
                                  PID:1708
                                  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                                    "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:2956
                                    • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                                      "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:1016
                                      • C:\Users\Admin\AppData\Local\complacence\isochronal.exe
                                        "C:\Users\Admin\AppData\Local\complacence\isochronal.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aut7188.tmp

    Filesize

    430KB

    MD5

    13dba54a2a11419b97aee8006020fa36

    SHA1

    c6b1a50ddc9d8fdf7d0afb78b385ad60eeccaf48

    SHA256

    81a181f3cd6a993cce9cc070712ec73722952c93c074139fef79948c5f006871

    SHA512

    ebdde80aa26794b343a511c2ae970a6e6a84fe979668a84131eaff6be8d38e14571b38097c2d7a53cc1296c87e91b0575e834d972d1eed58a915d229f3d31565

  • C:\Users\Admin\AppData\Local\Temp\aut73F9.tmp

    Filesize

    12KB

    MD5

    5d07eaf221871e079c67ecccf8990b15

    SHA1

    fe81c5733df15cec65073cadb84a7023698bd216

    SHA256

    172de0539151fabba3a973997a5c51422b4f97be956ff7694b72fd0f479bd071

    SHA512

    5e0c3d9e4b31f290659ac062e5e69527976d94e94a0153064b72b92f2e5f04eae11610f2c7f0c8b4c898bfd004643eb8d0a1b5061c3d80414771f0ceb12cfade

  • C:\Users\Admin\AppData\Local\Temp\biopsies

    Filesize

    96KB

    MD5

    421a5be3f307e4f8af564670f574a369

    SHA1

    2f421566012590f481cd1128cbba069dd05e9f51

    SHA256

    8ab2bb3e048e43ba4de9a9b90df47cf9a00e23a9875482cea1cf347111461ec0

    SHA512

    81e78fb9a5f881c07768be52e1b6fecf526f5a3ce435ed006bcd4894623a53c9c3e34395e95fa88183debc209bfad1652312e80a2a8d71ec733e1205a8be7a64

  • C:\Users\Admin\AppData\Local\Temp\konked

    Filesize

    256KB

    MD5

    48b19deb66a47f01f25e273c2ac84be3

    SHA1

    31d3edc843818da0c4930d85bac5f0857ae43b7f

    SHA256

    f24b2cebee593e7333356372a6873ffaaa8d2779e6e794109fb3bd83ed713dca

    SHA512

    06cdfdf6c7ffa4fe8a962937510868c1414ccd206f08069a9063eac5a92325e725e1c550a4dc57069130f6205ced60a36095d8858d24c7f81517a3defe84cf23

  • C:\Users\Admin\AppData\Local\Temp\konked

    Filesize

    483KB

    MD5

    33ff2a8d55f28be6c417a1eaf7ff12e6

    SHA1

    776b93d70d9c0b63509effe05d9e348282eec7b2

    SHA256

    f9ba2ae550e833d81bd7cde2d38d6d4f036cf076c5215400cf974cb283cbd61e

    SHA512

    d28f45706634b0097e458269ab6dd00f4df0e09afa1791c15a2d91eab3352dec2387439521c0222d1c83b0f9138733cb80751b235510f23c5197f8fc0934d726

  • C:\Users\Admin\AppData\Local\Temp\konked

    Filesize

    384KB

    MD5

    19d06459252a5abdbe44c222d7f18778

    SHA1

    9750e35c268561e0c386fc7817d0990557c540ab

    SHA256

    8827f6411edd118b0bd74d2f5eeec7a858878b860e0eeb4c2bff4d5271c0fd27

    SHA512

    b76be8fedcc1bd001598e4d9b380cd05ff971b24c959d51630497fe561edec1b03ccf161eeeb0ba64c73ee55ec4a28b4d5684c0ca9b9f69f568d699c0daeb668

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    16.4MB

    MD5

    f3d5b59d612bb3f48a3802391d6e7632

    SHA1

    d64f3692cbf61ea5f052b00c34b1b86a99d3be6f

    SHA256

    23dd70e2eaeb70a8be707ea16ea9a274989fa073e6013cb13cc29040e41daadf

    SHA512

    a62bc9033fe6470053ae0d27b9fe38877494e542fdb1e273a6e81f96bd77feeff329a3d8b7ba85d056c2cdc07b3f44e05337d42700e1d98e8afb93f10da0e9fc

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    1.5MB

    MD5

    6d63f5aa2d4e9dd7fa373d8185af7340

    SHA1

    ded5fba475a1a7b2c5e8558df6210dc731e4bf02

    SHA256

    e6fce9bc2440885d71855fcabdc5824b5d3a2b47b57e8cb0853aa66e7446a1f4

    SHA512

    1498ae20bdfdb3605d7a21053361ca9aa8af3cfafffd81aeb8838065fe9cbe43d074d2553ed2487665348f5de4f2075b9a6c96e66fc0e6448db4657eba20481e

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    1.8MB

    MD5

    120cce5988fb36a876e94dc8a3670f66

    SHA1

    0f92def07502317ccf0a1c28361c80e7e6224d88

    SHA256

    8fbcc97da9839808d8600508a9d375459adb92383b94cc5cc8317fcf85985fba

    SHA512

    7923a90b6fc857a10419ba55b4def82a37b880f6d706a1553e674d731d3eba0bd94ff9a3d626449bb0b12f5831547b4842b5e61e259414a3e322942f07bd0fda

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    30.3MB

    MD5

    dd124e2a2dadc66b01a7e2e60bd48d52

    SHA1

    eea508c8157473bcf4fc6c497ef4e254f2e3c588

    SHA256

    6476bf9fec57a7e4e92ba7a5edc557d9c975ea948874e28c78e906f38f2f8a64

    SHA512

    30515400c537b1b4dc09f22b32f3a714f2ca43c98872c6f58139b2fdad8be476d1f8bf1c4a0fd469de85dfda339da0a87cbff6bd3be518044f243d6322a8d457

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    11.5MB

    MD5

    8123009bb84092c15ad5b51392e6e857

    SHA1

    d1f74142acb0c89a54c6628e0b9a88ae56cfa6bb

    SHA256

    b1aa1e701dbfe308bed29d343dc42065de533c8f34ed9fea22d5720eb587e643

    SHA512

    525e6d920e12221d1b927599ce181c922eee2969b1bc1c66f47f10b6ef1b1af0380fbf6762f793e9eaf899cd7e4615f41ad909716dda07df42d35884f5faf1c9

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    2.8MB

    MD5

    774e0e1115ce0a0d547dbe7bc2365b01

    SHA1

    4dd547b7995d4295e959e8a0633e73cf69ab18ce

    SHA256

    570570d0816025f5455a70b9735f01ebf9982d9dd3b5a5ca3dc759a68410b269

    SHA512

    92e5323f8c4b81bf46883f232b4d0f0add9ecb9a9d7c65a9933a3825bd9c5fca81033fac182f836b1d69df68aca225f19b3c74657f388dbde9fd50b11b8caea8

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    4.4MB

    MD5

    94ff79195e26369635b06d4844844274

    SHA1

    98780c628f46fd263ee340739612622e8e691b45

    SHA256

    5ca2714ce77f63a66b93f6d8f6d593f885dda94e9f5063de8d530fd36e358e4d

    SHA512

    e4f2016a08aaf6a5431df30122f53f23266be366d51f6e3d63783ae9fd92a3c5344d290497a49902fd5d19acbcfb4dacae781fe3b7630ddb4d42c1833332b54a

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    179KB

    MD5

    1db9b0165c30764e27c6eb7761e251b2

    SHA1

    65e369054f021385824c65a2d4ad1c3a850b5bbf

    SHA256

    85c289bb37d12311be4fc8dc8c32bde944ab083a442c094eb089561eae194d2b

    SHA512

    8518eebb62a858adf7ed135f0d7e0da91ce7951b1c47ba720763a6797cf3de8acbd5c30337f116e17aa2b730a53cb9ac8f782a97681fd1c1de0a86a598149ad2

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    4.6MB

    MD5

    5e338f9a67399b3f36fa69f6fd45b4ab

    SHA1

    c6f6536ff3565fafba774522403320ec7a3fb351

    SHA256

    7ec2710632ca31282701e7f017addb6a964adba12940f20ca32568814f26f38b

    SHA512

    4e43821fbeb7513dad69a1eb466dea053c83c1bd9071cc96c509b3cd4c68e962be3507225f985437edf2a6d806c544a0467bec296d2b8c5c9b9f86389076713f

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    8.7MB

    MD5

    2d61249acc43f09344178e45d115177d

    SHA1

    bd44eca40ae48d7bde2952f89fbe2f0ac2000f18

    SHA256

    13dce6bbea65a60ae53a3f20b852c441dd822b1aa3b41dc00acdaffad6f7db1a

    SHA512

    ed427f6b10b79c720b3f73adc91058c9e465601a765c8b9708a77fe99d878eaa66f3102219c6d4b28a45232a63c15874627065d7e07c5b48eeac6a9bebeb9e40

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    13.5MB

    MD5

    6620980767f4d63c4783645c4ce15e49

    SHA1

    4c85d6f7739f53132a8665dd48bd6035792348b8

    SHA256

    c4878b6603b075427311a707d835db4ce9422ab3370fe6c47612c8cb6330434c

    SHA512

    8cad5875ef006c54254a9a0ba9ffe58da29a4a49d9a30766a0f246f2eafb53245927d633ba9d56ee3f31c37f8dfc4bb5e3a9f4e76d095ec1a02ca99bb2990cab

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    21.9MB

    MD5

    7f46a6ae8c2b2bc7834a7f585d25043b

    SHA1

    74e1d5580bb9222ae06c89ddefeec6102341691f

    SHA256

    cc0ca012972fc796814446252e1bb8b596d24a17c365367b0dbe63e313051bff

    SHA512

    f3c8a1cd35bbee8f1cd7effac86fc0b5ff17461fe884b835ebe1353552e22bff1b6202eceeb6f33334ce8c88159747409264a5ee8335240af6522acc78bbaa9c

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    3.7MB

    MD5

    32180dc2c05f303c1f6d0e396af312e7

    SHA1

    8baf4caac213fd93e5f0314db3d1335f8d2a1389

    SHA256

    44bcfab815177ee412a33f6b0f9265ca9c064513861d818d9129b67b060c5fee

    SHA512

    5223961e4018696cf18c33f4ebee1648600648c8c05939dbfad0cdc357c96ec5f49262e8b5c6043ba0c4d228c7a8c6f40a980a00b69267b76729a8636ef794c5

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    2.2MB

    MD5

    c4c9595fcea30814bad15fd88dabc740

    SHA1

    e33d20538aaafc49938f8482180822d7c8b9ba43

    SHA256

    113ccfab0c1b56877a3af2d453f86a518bd34ad819b0c28fa05434053903123b

    SHA512

    07ac26501348c624e99b0c4272b460d28caf9b308f68d6b830cf524be9609522ee06cff768c65cdf54682b57c4a6b4249e415bb6c6da98851b357487fd37b00e

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    4.5MB

    MD5

    89277376ccd1c43de0e087148636f9f2

    SHA1

    f4ab70c5b1504821624a4d99efbd9aa814773fbb

    SHA256

    d7c92ccccc8d77d260f661bae654870f9c715a6c63502bc3bb4ed0c2b6980976

    SHA512

    5599b76db01fd9fab10e871814e57c5b75a74e2516641f256354c3b8210420eb378a1edc3bba0b3abce9ae44818fb5212e014ef7150ff2a909e3d7c050e56ded

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    1.4MB

    MD5

    bb4225036c320720a0e3a982f8ded5f2

    SHA1

    60bf8f103dc137435b5791f60b82e163d03858d4

    SHA256

    c065b760f975b8f04df4d4a6253ef880289bc3e66450d528688893d990937c87

    SHA512

    e08cf7676d33569e176bdb173712bfb3bc6be5de7d4bee0b70dd1013e81248fb55db46eaca6aa91233f870502c438c9b9ba54b66d0694d012e4d716c29528e4c

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    25.1MB

    MD5

    aef563df7798acbd5b70ce1b6d8d4707

    SHA1

    e1beb7d042e0e3be9f13d82a24b3f91f635dbc27

    SHA256

    3a968879cd52285ec78cec89fc110e7b58eb2f605285d2227246297121fc0582

    SHA512

    1ee0b7100551ba7d5729e6416ece1803003d54a0149060c9c5e50c7e0a5f063baeb6948986b83674ab1267f7ec2b8ff60717ebc4bd0ec4d736a8ee8051e6263b

  • C:\Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    12.3MB

    MD5

    5d9bcafb579d72d83e539536542be758

    SHA1

    16297a0cde011d3ff653af455423fb367fd23e16

    SHA256

    18b3d22ae12d1ab4145bdc7373fb8359a340c043f13051c5f9605a27976353e4

    SHA512

    09424e364988e64bf5f5fe9e73b3d9f4a18278832abdf6053a5115851208cea37838126d2c836110e241fac175a8d157ab4ab8aa9429cc442c38a40acb31499f

  • \Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    8.6MB

    MD5

    6fdbad4c077639b4a92920facf7ea903

    SHA1

    b259daf7b5f838afe4569bc64d9cd57b82ea4db1

    SHA256

    71c5b429c10a3f154fed5538a1a26f73c5bb0a27956c93f8b4a59d5cd54114b2

    SHA512

    c6037a4342c486aa2f870963b7db225cb72071345996b09c9b6cc61bd7d79f035514514982c7373c7a3d2ad0772dd639648a96925bddc23708a25b6107f3aaf9

  • \Users\Admin\AppData\Local\complacence\isochronal.exe

    Filesize

    1.9MB

    MD5

    b50d58d2f85665866bf716b53ad4a093

    SHA1

    8ff4d93dd8cd319b868d2e38b9dfdd55a7d36704

    SHA256

    e9a7e21a7d568da181f14c40a14867568bc098906d1501aca0112379047eba93

    SHA512

    d04e15b0ad256ca688b8814bd30b02ac7c7739e8424e482363642114271df6d9545922c507dc00c07b23368845b71973d2f90aa6a50638be8c0318d9d5039c24

  • memory/2596-10-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB