Resubmissions
20/07/2024, 17:27
240720-v1emxavane 720/07/2024, 14:12
240720-rjbcda1ank 720/07/2024, 13:31
240720-qsf4jszenk 7Analysis
-
max time kernel
250s -
max time network
242s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
Win10PEͫISO������θ��U+�����.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Win10PEͫISO������θ��U+�����.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
Win10PEͫISO������θ��U+�����.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Win10PEͫISO������θ��U+�����.exe
Resource
win11-20240709-en
General
-
Target
Win10PEͫISO������θ��U+�����.exe
-
Size
5.6MB
-
MD5
07666772bd9ebe9ee1640d809cfebfac
-
SHA1
3dd0e88237d7e07eb0bb6f8c2cb88193501a6ace
-
SHA256
f2f1fc564105abe1c6bdd7fe761a2b311e3001635da5793a80ce5ea5815b5335
-
SHA512
3fccc38a3be034600279b65574a952a221ec92e0271a0ba5851ee8ee09420cba1d652b93ea95ebe5abee76ddccd25df06e5628eb771974d7c033f826c738e460
-
SSDEEP
98304:1gn4tDDhQuJMi/S7K5hotckS/jARtiax/L4uILoimOk5k3OhTZTzS9a8SSQxl9yg:1gnQDhQuqLSwUsHtsBmOk+3OtZTzPxB/
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0008000000015fa5-6.dat upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1576-20-0x0000000000400000-0x0000000000F62000-memory.dmp autoit_exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\cimv2 Win10PEͫISO������θ��U+�����.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1576 Win10PEͫISO������θ��U+�����.exe 1576 Win10PEͫISO������θ��U+�����.exe 1576 Win10PEͫISO������θ��U+�����.exe 1576 Win10PEͫISO������θ��U+�����.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1576 Win10PEͫISO������θ��U+�����.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ab5174b12f6352a35fd06df6adfab11d
SHA1b46c87f6956d6ad8419bccc27e11e4abc2fab517
SHA256eb006a0313dadb01b1d7d914312aaef43aa14aa66e22a50db07046af75565c03
SHA51201413705aca49c2e5b0181c2a4c2412f3fe453334a263a072508c785f083f900bf46e644c6444f8b3ae40618b66ae95b7993f80bc07b96feb42cb5dab4d57b9b
-
Filesize
1.8MB
MD5f0783ec7a00f0bb6a29fc9f7be5e75d0
SHA12977648c9d3a71df0d7693ecd1a78eb4a5863136
SHA256198358d18ddcefebe4b5aa9474f040dcc34565847229d8f2612e651c665dc606
SHA512bc276d30cecba5d479f463493b079dd6055bbb7db315373f83e4cfa10f661ac41b47d5f099ae5f9a70de57a15cf3245514ef43b51f2ab43dc818583eb18c586f
-
Filesize
23KB
MD5fbba1b9705ee26d0761bf412fd6606f5
SHA1527af875a28ee8a3617d68f9750fe4303388cc85
SHA256983601e712adb4effc336e6db1f9d12bc06a8bf1def84b8d3d4714292a7f5a60
SHA5122b2d522bdfc398346beda4635f5c9c4fe38f6a108ab9256faffa80539a39017bfc26e12088f42b3490b54c582cfacdd764efdb23ef9c5ca3f5fc6fe92660d051