Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 15:40
Behavioral task
behavioral1
Sample
00496781632BBDMYDH.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00496781632BBDMYDH.exe
Resource
win10v2004-20240412-en
General
-
Target
00496781632BBDMYDH.exe
-
Size
663KB
-
MD5
2cf7c8b589f49652043dbabcc8b44481
-
SHA1
0d9ec6103245c8fecd5414e8adaed8dbd2b2011d
-
SHA256
f1cdb30887c19f473dd83faaad255f7e5b70d98f1722288d7398175e89a44803
-
SHA512
b3de6ba48815366e80e81ec1f6ccc99f96dc848434ac03030af48dce5ad33929714dfe28632c7fe5a0a659af7961bc68fba0e168f6c22ff15ae965ba70ea082f
-
SSDEEP
12288:NYV6MorX7qzuC3QHO9FQVHPF51jgcgKNLJPBZ/QjmhsgsYulNeZELrZ:iBXu9HGaVHnZJr/QqhNsnrQU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2244-0-0x0000000000190000-0x0000000000309000-memory.dmp upx behavioral1/memory/2244-13-0x0000000000190000-0x0000000000309000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2244-13-0x0000000000190000-0x0000000000309000-memory.dmp autoit_exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2244 00496781632BBDMYDH.exe 2244 00496781632BBDMYDH.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2244 00496781632BBDMYDH.exe 2244 00496781632BBDMYDH.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD55fd7185e5b99ca235d00047757734d9a
SHA112bb706773b60f72279f971de973ade2df300782
SHA256052e6e30e8c3ccfeecbbf3cc4e6bbead735b95470450ed956b199419403c64f8
SHA512050b4b4f240b54f31f5f6d099e9b0a4688cd3777a18c81180334f5af746ab6e2f8c7eacc1f54fc7bdd3decf6567d2a581f95befcc4bb986c8172c49ba8a96dbe