Overview
overview
8Static
static
3au.exe
windows7-x64
7au.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3Data/sqlite3.dll
windows7-x64
3Data/sqlite3.dll
windows10-2004-x64
3Office2007Blue.dll
windows7-x64
1Office2007Blue.dll
windows10-2004-x64
1au.chm
windows7-x64
1au.chm
windows10-2004-x64
1au.exe
windows7-x64
7au.exe
windows10-2004-x64
7au32.exe
windows7-x64
1au32.exe
windows10-2004-x64
3clearpasti...ry.vbs
windows7-x64
8clearpasti...ry.vbs
windows10-2004-x64
8createsrpoint.vbs
windows7-x64
4createsrpoint.vbs
windows10-2004-x64
1da.exe
windows7-x64
3da.exe
windows10-2004-x64
3hstdel.exe
windows7-x64
1hstdel.exe
windows10-2004-x64
3rc.chm
windows7-x64
1rc.chm
windows10-2004-x64
1rc.exe
windows7-x64
3rc.exe
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Data/sqlite3.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Data/sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Office2007Blue.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Office2007Blue.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
au.chm
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
au.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
au32.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
au32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
clearpasticonhistory.vbs
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
clearpasticonhistory.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
createsrpoint.vbs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
createsrpoint.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
da.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
da.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
hstdel.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
hstdel.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
rc.chm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
rc.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
rc.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
rc.exe
Resource
win10v2004-20240802-en
General
-
Target
au.exe
-
Size
2.9MB
-
MD5
5493c679e69f08d5beff4d80f2d8f3cc
-
SHA1
1367121fa80e35fa43cf5d8e29a47e04f952a3e2
-
SHA256
3cc6062ddd4605fba0a5238ba1118eaf0a35b808c70ae0dd9a41c69b2f27f3f6
-
SHA512
bb6213a2786194aae0aa21609800a2e8273f99917581d4e6fefe5da7b7c2db3bb3ec3bbff8a9a0d219bea32983732e722f9470b97dd88655a9eecfbbe89de698
-
SSDEEP
49152:PWTqVTDv7zUUdCWhRrS+/sGXP8cdKIuCHfUo9Rg01MQt:P1N7zZbS+ES8cjuCHfUmR1MQt
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate au.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion au.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language au.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7BC40362-40BF-FB5B-696C-16558496BC25} au.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7BC40362-40BF-FB5B-696C-16558496BC25}\ = "Background Intelligent Transfer Control Class 2.5" au.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7BC40362-40BF-FB5B-696C-16558496BC25}\AppID = "{69AD4AEE-51BE-439b-A92C-86AE490E8B30}" au.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1996 au.exe Token: SeIncBasePriorityPrivilege 1996 au.exe