Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
IMG______6122024.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
IMG______6122024.exe
Resource
win10v2004-20240611-en
General
-
Target
IMG______6122024.exe
-
Size
1.2MB
-
MD5
7754fb5516eea45c40fc3b3f29e55cca
-
SHA1
00b7053d8554616b35d482fc98c43c6cb22e2328
-
SHA256
a5687583ab164c93400b8c1a4c4e500dbc800559cb0294558852bce1cb62e540
-
SHA512
88a1eda10932186fceeb7ac698d1987619c471ec74b052faf6db9e9259dcce06aa8fda52d212f1ffc6780172c63ecfe69dcabb5188e02c225330c7817b15b72c
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHahExzVA/bE3ERmxSvXwUYWrV5:2h+ZkldoPK8YahazVOb4AXwU/z
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 2448 name.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 IMG______6122024.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2372-11-0x0000000000330000-0x0000000000463000-memory.dmp autoit_exe behavioral1/files/0x0008000000015d97-13.dat autoit_exe behavioral1/memory/2372-17-0x0000000000330000-0x0000000000463000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2448 set thread context of 2932 2448 name.exe 29 PID 2932 set thread context of 1204 2932 svchost.exe 21 PID 2932 set thread context of 2224 2932 svchost.exe 30 PID 2224 set thread context of 1204 2224 sethc.exe 21 -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2932 svchost.exe 2932 svchost.exe 2932 svchost.exe 2932 svchost.exe 2932 svchost.exe 2932 svchost.exe 2932 svchost.exe 2932 svchost.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe 2224 sethc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2448 name.exe 2932 svchost.exe 1204 Explorer.EXE 1204 Explorer.EXE 2224 sethc.exe 2224 sethc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2372 IMG______6122024.exe 2372 IMG______6122024.exe 2448 name.exe 2448 name.exe 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2372 IMG______6122024.exe 2372 IMG______6122024.exe 2448 name.exe 2448 name.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2448 2372 IMG______6122024.exe 28 PID 2372 wrote to memory of 2448 2372 IMG______6122024.exe 28 PID 2372 wrote to memory of 2448 2372 IMG______6122024.exe 28 PID 2372 wrote to memory of 2448 2372 IMG______6122024.exe 28 PID 2448 wrote to memory of 2932 2448 name.exe 29 PID 2448 wrote to memory of 2932 2448 name.exe 29 PID 2448 wrote to memory of 2932 2448 name.exe 29 PID 2448 wrote to memory of 2932 2448 name.exe 29 PID 2448 wrote to memory of 2932 2448 name.exe 29 PID 1204 wrote to memory of 2224 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2224 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2224 1204 Explorer.EXE 30 PID 1204 wrote to memory of 2224 1204 Explorer.EXE 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IMG______6122024.exe"C:\Users\Admin\AppData\Local\Temp\IMG______6122024.exe"2⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\IMG______6122024.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\IMG______6122024.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2932
-
-
-
-
C:\Windows\SysWOW64\sethc.exe"C:\Windows\SysWOW64\sethc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD51d7fa7c2aa0729662e056393d57cf3b2
SHA1ef410b0a4c3e9cbaaacd822f71aa60408a5c3f66
SHA256fdbd3343b512ed2ee6fc17a3ff6df37cac425408ef3e4e6b0dd3b70b6a79a774
SHA51208101219d435aefa9c701f6f20c51275200760db9565dbd1f19cc98e8f409ea90ba439c2833469b70355b55c3e3f09cf7b681cf6a2f67b8494811512fc20f7bd
-
Filesize
265KB
MD5e3076f64582a5b800e333ac8fe8debc5
SHA186819a57c25e258a4f64c1f942aad91ffd6ab0b8
SHA256fc99d6a9f2d90d1e805b880bf0f326e82700f230f73b27a37720466fa2d178aa
SHA512cf86f7975564db9db010d3bedc307c2b7950b1f04e96d7ee433b5ebc4028bb29eb93ffad5e1da50fdf44d29ce2813f7af8765a0ec20e9516f7a9da757d4e3825
-
Filesize
1.2MB
MD57754fb5516eea45c40fc3b3f29e55cca
SHA100b7053d8554616b35d482fc98c43c6cb22e2328
SHA256a5687583ab164c93400b8c1a4c4e500dbc800559cb0294558852bce1cb62e540
SHA51288a1eda10932186fceeb7ac698d1987619c471ec74b052faf6db9e9259dcce06aa8fda52d212f1ffc6780172c63ecfe69dcabb5188e02c225330c7817b15b72c