Overview
overview
10Static
static
10Awesom-O/A...er.exe
windows7-x64
7Awesom-O/A...er.exe
windows10-2004-x64
7Awesom-O/A...er.exe
windows7-x64
7Awesom-O/A...er.exe
windows10-2004-x64
7Awesom-O/A...or.exe
windows7-x64
7Awesom-O/A...or.exe
windows10-2004-x64
7Awesom-O/A...er.exe
windows7-x64
7Awesom-O/A...er.exe
windows10-2004-x64
7Awesom-O/A...om.exe
windows7-x64
7Awesom-O/A...om.exe
windows10-2004-x64
7Awesom-O/Awesom-O.dll
windows7-x64
3Awesom-O/Awesom-O.dll
windows10-2004-x64
3Awesom-O/Awesom-O.exe
windows7-x64
3Awesom-O/Awesom-O.exe
windows10-2004-x64
3Awesom-O/c...ll.vbs
windows7-x64
1Awesom-O/c...ll.vbs
windows10-2004-x64
1Awesom-O/c....1.pdf
windows7-x64
3Awesom-O/c....1.pdf
windows10-2004-x64
3Awesom-O/c...cs.pdf
windows7-x64
3Awesom-O/c...cs.pdf
windows10-2004-x64
3Awesom-O/c...ll.vbs
windows7-x64
1Awesom-O/c...ll.vbs
windows10-2004-x64
1Awesom-O/c...le.vbs
windows7-x64
1Awesom-O/c...le.vbs
windows10-2004-x64
1Awesom-O/c...ies.js
windows7-x64
3Awesom-O/c...ies.js
windows10-2004-x64
3Awesom-O/c...es.vbs
windows7-x64
1Awesom-O/c...es.vbs
windows10-2004-x64
1Awesom-O/c...ets.js
windows7-x64
3Awesom-O/c...ets.js
windows10-2004-x64
3Awesom-O/c...ons.js
windows7-x64
3Awesom-O/c...ons.js
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 06:34
Behavioral task
behavioral1
Sample
Awesom-O/AOHelpers/Awesom-O Debugger.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Awesom-O/AOHelpers/Awesom-O Debugger.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Awesom-O/AOHelpers/BotINIManager.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Awesom-O/AOHelpers/BotINIManager.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Awesom-O/AOHelpers/PREditor.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Awesom-O/AOHelpers/PREditor.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Awesom-O/AOHelpers/Realm Fixer.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Awesom-O/AOHelpers/Realm Fixer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Awesom-O/Auto-Awesom/Auto-Awesom.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Awesom-O/Auto-Awesom/Auto-Awesom.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Awesom-O/Awesom-O.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Awesom-O/Awesom-O.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Awesom-O/Awesom-O.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Awesom-O/Awesom-O.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Awesom-O/config/PR_Docs/ao2luafull.vbs
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Awesom-O/config/PR_Docs/ao2luafull.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Awesom-O/config/lua/Docs/PR2.1.pdf
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Awesom-O/config/lua/Docs/PR2.1.pdf
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
Awesom-O/config/lua/Docs/PR_Docs.pdf
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Awesom-O/config/lua/Docs/PR_Docs.pdf
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Awesom-O/config/lua/Docs/Reference/AO2Lua_Full.vbs
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Awesom-O/config/lua/Docs/Reference/AO2Lua_Full.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Awesom-O/config/lua/Docs/Reference/UltraEdit/LuaPR_Wordfile.vbs
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Awesom-O/config/lua/Docs/Reference/UltraEdit/LuaPR_Wordfile.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Awesom-O/config/lua/Docs/itemEntries.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Awesom-O/config/lua/Docs/itemEntries.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Awesom-O/config/lua/Docs/itemTables.vbs
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Awesom-O/config/lua/Docs/itemTables.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
Awesom-O/config/lua/Greedy/PickitRevolution/classic/magic/amulets.js
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Awesom-O/config/lua/Greedy/PickitRevolution/classic/magic/amulets.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Awesom-O/config/lua/Greedy/PickitRevolution/classic/magic/weapons.js
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
Awesom-O/config/lua/Greedy/PickitRevolution/classic/magic/weapons.js
Resource
win10v2004-20240709-en
General
-
Target
Awesom-O/AOHelpers/BotINIManager.exe
-
Size
389KB
-
MD5
c2034abf42938f5ba454b8a820291163
-
SHA1
1baee50e23f6da7dacdd0db24b2848b5516eaf99
-
SHA256
2cb8491b6a1776b97f53659b9ca9b5bcb896d944c12c74aa6969c1787390a596
-
SHA512
66f0979b16250e412e25c4a39f18ca599be0840d2722d9affd48528f82d727d3e61dc4b5b24cb92da715706beff36d77eb4fd1cce87ec4fbbae14ea38bbc33a4
-
SSDEEP
12288:enNhuBoY8SorxgmA+nlvVlmmZH8Ygl4s2F:ePatCg7EPEmZHSll2F
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/1104-0-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-1-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-2-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-3-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-4-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-5-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-7-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-8-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-9-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-10-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-11-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-12-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-13-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-14-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/memory/1104-15-0x0000000000400000-0x00000000004A2000-memory.dmp upx -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/memory/1104-1-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-2-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-3-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-4-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-5-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-7-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-8-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-9-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-10-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-11-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-12-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-13-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-14-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral4/memory/1104-15-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BotINIManager.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ BotINIManager.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ BotINIManager.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1104 BotINIManager.exe