Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
New AutoHotkey Script (2).ahk
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
New AutoHotkey Script (2).ahk
Resource
win10v2004-20240508-en
General
-
Target
New AutoHotkey Script (2).ahk
-
Size
3KB
-
MD5
c64eb1b7fe696dd45d6642c6d82ddfab
-
SHA1
4df75aa84b03bacbfc0b4f0276c82f2bd9f410a6
-
SHA256
4076b02a2310bcd24e9aaccce10a9a8bce4cb1d9e1ba030af71f5a453fb461ee
-
SHA512
04e071536b81e55b35cb33e18302ae24fd24f49922239a5de000537ec4803990ce91c7ea04dbf16d4e8a49d999036c44a2e54327225365cfa7285e1612c64d2b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\ahk_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\ahk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\ahk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\ahk_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\ahk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\ahk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\.ahk rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\.ahk\ = "ahk_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2608 AcroRd32.exe 2608 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2848 2544 cmd.exe 29 PID 2544 wrote to memory of 2848 2544 cmd.exe 29 PID 2544 wrote to memory of 2848 2544 cmd.exe 29 PID 2848 wrote to memory of 2608 2848 rundll32.exe 30 PID 2848 wrote to memory of 2608 2848 rundll32.exe 30 PID 2848 wrote to memory of 2608 2848 rundll32.exe 30 PID 2848 wrote to memory of 2608 2848 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New AutoHotkey Script (2).ahk"1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\New AutoHotkey Script (2).ahk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\New AutoHotkey Script (2).ahk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD511ba5fb0f9d5d436302d888be5f5a26d
SHA1bd493d324808a647cabbba80adf6927e5723cdc6
SHA25679eadf77aa75d71518abc53bf5d8d608570068cdeabe1dfeb1931a6ddd994814
SHA5120980e8d458607b5baddd03555e89efb19d922ea3621444e52411128680578d013e77c0d04e5b19b9d755328a62210df9be62bc053706b6dee3c222671a834778