Overview
overview
10Static
static
10AutoPowerO...on.exe
windows7-x64
7AutoPowerO...on.exe
windows10-2004-x64
7$PLUGINSDI...on.exe
windows7-x64
7$PLUGINSDI...on.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AutoPower.exe
windows7-x64
10AutoPower.exe
windows10-2004-x64
10Help.chm
windows7-x64
1Help.chm
windows10-2004-x64
1RunDLL.dll
windows7-x64
3RunDLL.dll
windows10-2004-x64
3SASHOOK.dll
windows7-x64
3SASHOOK.dll
windows10-2004-x64
3autoss.exe
windows7-x64
10autoss.exe
windows10-2004-x64
10disktop.exe
windows7-x64
1disktop.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7AutoPowerO...��.htm
windows7-x64
1AutoPowerO...��.htm
windows10-2004-x64
1AutoPowerO...�).url
windows7-x64
1AutoPowerO...�).url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 20:31
Behavioral task
behavioral1
Sample
AutoPowerOn_windown8/AutoPowerOn/autopoweron.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
AutoPowerOn_windown8/AutoPowerOn/autopoweron.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/autopoweron.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/autopoweron.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
AutoPower.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
AutoPower.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Help.chm
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Help.chm
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
RunDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
RunDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
SASHOOK.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SASHOOK.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
autoss.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
autoss.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
disktop.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
disktop.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uninst.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
AutoPowerOn_windown8/下载说明.htm
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
AutoPowerOn_windown8/下载说明.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
AutoPowerOn_windown8/使用帮助(河东软件园).url
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
AutoPowerOn_windown8/使用帮助(河东软件园).url
Resource
win10v2004-20240508-en
General
-
Target
disktop.exe
-
Size
498KB
-
MD5
6bf4a69d3f938496f36dc3fa2f7dda0b
-
SHA1
eedc94f5a8df9a4aa5eb58b3fc835448e2825ea5
-
SHA256
1f73df400d14b85e556a20d94b1e2ae85ce860dabe190c6bdb644c4c354684ad
-
SHA512
a9e3674a03a2b7c61353281a6c419901f9a9cb7210bf38b05729e2a7b21778b251502bb87f09d39ee89d2f6dd1b2fef8dacc0ab0ecc2345398eb2fb877de311f
-
SSDEEP
6144:sjrnm1kUXj+SkzpzRCv5HcPIloaxsEdAJqAHVgiTeYuH70KNXfreXH1wOA1yMGIS:srnjUXj+SkxWSEyXC3Yub1qXHrA1hKl
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
disktop.exepid process 4188 disktop.exe 4188 disktop.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
disktop.exedescription pid process Token: SeDebugPrivilege 4188 disktop.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
disktop.exepid process 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe 4188 disktop.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
disktop.exedescription pid process target process PID 4188 wrote to memory of 608 4188 disktop.exe winlogon.exe PID 4188 wrote to memory of 608 4188 disktop.exe winlogon.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\disktop.exe"C:\Users\Admin\AppData\Local\Temp\disktop.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4188