Analysis

  • max time kernel
    129s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/05/2024, 20:00

General

  • Target

    AutoHotkey_1.1.37.02_setup.exe

  • Size

    3.3MB

  • MD5

    c2e8062052bb2b25d4951b78ba9a5e73

  • SHA1

    947dbf6343d632fc622cc2920d0ad303c32fcc80

  • SHA256

    49a48e879f7480238d2fe17520ac19afe83685aac0b886719f9e1eac818b75cc

  • SHA512

    c9a5ea57842f69223bd32a9b9e4aaad44d422f56e362469299f56d8b34b5e8bbf2b51d4e64d2bebe6c95d6d8545a8a88e6107b9b0a813e469f613e1353aad7a4

  • SSDEEP

    98304:m7EROaI2yEbVidvdahm6QAxuE4iLqmzLdtte96g:m4FyMVq4og4iLqmNqMg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.37.02_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.37.02_setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\7z7E12D3E8\setup.exe
      C:\Users\Admin\AppData\Local\Temp\7z7E12D3E8\setup.exe
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of SetWindowsHookEx
      PID:304

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7z7E12D3E8\setup.exe

          Filesize

          872KB

          MD5

          b98ee9e00b5546763f9c6e65e436f6e6

          SHA1

          a28e2b0ba6cc748d166b2eb6d0c8acb0bd3b9f3b

          SHA256

          6d876c526b5cbc5dc5341c1011b1c91639597f46677a1d42426f4a52dfea6756

          SHA512

          556e632fe39231622398c5afccc51d01f25bc430705a126737877ed9f354c7076b5bf3cbac27f8a1c4db4d326b6a8848fae4b8d6046f816597c370d06e824591

        • memory/304-47-0x0000000000C50000-0x0000000000D50000-memory.dmp

          Filesize

          1024KB

        • memory/304-48-0x0000000000C50000-0x0000000000D50000-memory.dmp

          Filesize

          1024KB