Analysis
-
max time kernel
15s -
max time network
28s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
26-07-2024 18:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
AutoDrawer.exe
Resource
win10-20240611-en
windows10-1703-x64
4 signatures
150 seconds
General
-
Target
AutoDrawer.exe
-
Size
846KB
-
MD5
e022f7d2dfd5ec29ceecb045f82e235d
-
SHA1
b56614b417ede1ef1d9ad322281bc449890fc6af
-
SHA256
a6baa2c2ca9c9712c78dd393ad179febf7079b285487796d335e767e34ea4f07
-
SHA512
70da82001bfa22f2776a70cb4df3fed98cf4f513b6d6e6d3bede28c602da9b6e1f6acc9c69e24b17dd3a140c86768ee77403425f538ddc70edc326959c41485b
-
SSDEEP
12288:lsUS5E65E6bXSrZdfrXg+JwuKt/S/60TXo:YE6bCrfw+Jwz/S/6oo
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2916 2688 WerFault.exe 69 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoDrawer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 AutoDrawer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 AutoDrawer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoDrawer.exe"C:\Users\Admin\AppData\Local\Temp\AutoDrawer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 12962⤵
- Program crash
PID:2916
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:244