Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
cbfa335a0dd194d4f17aca17d6b34092.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbfa335a0dd194d4f17aca17d6b34092.exe
Resource
win10v2004-20240226-en
General
-
Target
cbfa335a0dd194d4f17aca17d6b34092.exe
-
Size
639KB
-
MD5
cbfa335a0dd194d4f17aca17d6b34092
-
SHA1
ba3710fff89beb8db9fdb11cc6d3502e8d990e18
-
SHA256
66a43ede1d7b2629de48040cb19cd2aff8319691a62edf1f5b231cbdda0937b6
-
SHA512
52db1904a34e472cb0f635041f0b4fa297a69919eae7623ac1b7d2614db738328db05584dabae8904ff2f31327d80b709d00127dbd2ddf2ed1af9008d695ea16
-
SSDEEP
12288:dhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcbNmrK:rRmJkcoQricOIQxiZY1WNmW
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1648-0-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1648 cbfa335a0dd194d4f17aca17d6b34092.exe