Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
New folder/Autoit3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
New folder/Autoit3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
New folder/ac337d0e2c1d6f6a1132285a.au3
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
New folder/ac337d0e2c1d6f6a1132285a.au3
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
New folder/execute.bat
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
New folder/execute.bat
Resource
win10v2004-20240508-en
General
-
Target
New folder/ac337d0e2c1d6f6a1132285a.au3
-
Size
149KB
-
MD5
3b340bfe4c0707bc961338f81b77ae2d
-
SHA1
93f5ba8d5f5c242f7e971d5fa7881df6c9150046
-
SHA256
ac337d0e2c1d6f6a1132285a409a49a0003a2e058cf84063fd899e5d40103b83
-
SHA512
9199c027389252fcab8d236162bfeb74519df0fbbd4603775f7a6a0e67cf061f35fd57287604797521cdcdb473f2fe93f7736c0459ea2909fbf088045942f1cd
-
SSDEEP
1536:1F+W3GYbAx7LfIji3tIdprUZIpJkmRz+zDgA1s:SXzEiODU29D
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\au3_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\au3_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.au3 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.au3\ = "au3_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\au3_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\au3_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\au3_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\au3_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2716 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2716 AcroRd32.exe 2716 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2136 wrote to memory of 2596 2136 cmd.exe rundll32.exe PID 2136 wrote to memory of 2596 2136 cmd.exe rundll32.exe PID 2136 wrote to memory of 2596 2136 cmd.exe rundll32.exe PID 2596 wrote to memory of 2716 2596 rundll32.exe AcroRd32.exe PID 2596 wrote to memory of 2716 2596 rundll32.exe AcroRd32.exe PID 2596 wrote to memory of 2716 2596 rundll32.exe AcroRd32.exe PID 2596 wrote to memory of 2716 2596 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New folder\ac337d0e2c1d6f6a1132285a.au3"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\New folder\ac337d0e2c1d6f6a1132285a.au32⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\New folder\ac337d0e2c1d6f6a1132285a.au3"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b4f04e796ddfd19e5b25b5ad879153c
SHA16e03a0c4f0f2890cd28788af79cf1ccedaa14112
SHA256ae4963ab74b0a7cb1a1f8cb50a79ce5bd0be18ae4dd409c668462e031090463f
SHA5123688f902123f21cbc448a6f954af0f8bc7dc13efa7f7b815668378a4bc0b13eb849273423fed8c0bc965f74d2aabe1fe6b9f8600e319864e17492a16e9f0cdef