Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/08/2024, 08:57
Behavioral task
behavioral1
Sample
bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de.exe
Resource
win10v2004-20240802-en
General
-
Target
bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de.exe
-
Size
329KB
-
MD5
2b7bff01c4165d267d31d52c15b2d0ec
-
SHA1
78005f5565c8a4e60da962f7084c0888d2b89911
-
SHA256
bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de
-
SHA512
3af9fe1064b63f4ebd11f1be250e1c61b2f7d37f5ddba1e96c35a09720f3b76cc196e2f61b1296064c31d6c536a7c0eb9bceb7a3328936f697ce79afe6126747
-
SSDEEP
6144:f68oipnnK9jqXEX52Ums+Tbxzbx9SmIqQyPodMUf8Dkzel6R8zHe1I0:ZfnnK9zABs+TbFx9SXOPCf8DkqAR8zH6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4244-0-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral2/memory/4244-1-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral2/memory/4244-2-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral2/memory/4244-3-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral2/memory/4244-4-0x0000000000400000-0x00000000004D0000-memory.dmp upx -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4244-1-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral2/memory/4244-2-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral2/memory/4244-3-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral2/memory/4244-4-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4244 bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de.exe 4244 bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de.exe"C:\Users\Admin\AppData\Local\Temp\bf9a426fff27204f4681aeb9038fd85c356cd95ed6aa4ab8c1d1fe814496f0de.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4244