Analysis
-
max time kernel
60s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-08-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
afk_script.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afk_script.exe
Resource
win10v2004-20240802-en
General
-
Target
afk_script.exe
-
Size
717KB
-
MD5
4a019d979efaaeb57d14d683b39edcb0
-
SHA1
a32943c45c49c078d9e56d378c414381cfc5ef2c
-
SHA256
d217ea3fc2476397abce4b9b3e7b76c9a65e3d46e733e142edad5cac91b5cf48
-
SHA512
9652d723a5a641bbef2a1e75d8499f1f4a31cec020f859cca9dc04a106b529e76b001cc48b188343aae4873389c563d5f90c188ac6c4b00d30cdbd12e02b735a
-
SSDEEP
12288:wbIiH/aeCYInjw4V8VVyykJP3qzzSt+HyySPKFVH+JVSUKcv96gcBdinbwHyFkI6:wsiHCC54ViVyJtqzqv9IdHHyGeQl561u
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afk_script.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 afk_script.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2076 afk_script.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afk_script.exe"C:\Users\Admin\AppData\Local\Temp\afk_script.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2076
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\CloseUninstall.cmd" "1⤵PID:2512