Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 11:25
Behavioral task
behavioral1
Sample
e18cd9c705201f10a09460116cdcfdd2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e18cd9c705201f10a09460116cdcfdd2.exe
Resource
win10v2004-20240226-en
General
-
Target
e18cd9c705201f10a09460116cdcfdd2.exe
-
Size
673KB
-
MD5
e18cd9c705201f10a09460116cdcfdd2
-
SHA1
21842b280055dba1adb1f0b00f0cee970e6d5043
-
SHA256
6d73ef18408bd3ec6f9247b0750a88aabbf759ea1cc110d72b693b6f75f3a8ad
-
SHA512
61b7375e486dbf13fa0a5cb73d33f2566052e1ab20351174727c81acdca38844e586d4bb5373fc9f330cde5cc3b18d0c192bf0612e22bfd1f3ec62362d1258f9
-
SSDEEP
12288:yjkArEN249AyE/rbaMct4bO2/VWMa1QbByvW153d3s2XFk+7TYIXPZW6mzTTCjS:lFE//Tct4bOsk/qBIW1Zxs8F975EdfTv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/952-0-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/952-17-0x0000000000400000-0x00000000004BF000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/952-17-0x0000000000400000-0x00000000004BF000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 952 set thread context of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1064 e18cd9c705201f10a09460116cdcfdd2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28 PID 952 wrote to memory of 1064 952 e18cd9c705201f10a09460116cdcfdd2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e18cd9c705201f10a09460116cdcfdd2.exe"C:\Users\Admin\AppData\Local\Temp\e18cd9c705201f10a09460116cdcfdd2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\e18cd9c705201f10a09460116cdcfdd2.exe"C:\Users\Admin\AppData\Local\Temp\e18cd9c705201f10a09460116cdcfdd2.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1064
-