Overview
overview
7Static
static
7AutoHotkey1000.exe
windows11-21h2-x64
7$PLUGINSDI...ns.dll
windows11-21h2-x64
3AU3_Spy.exe
windows11-21h2-x64
3AutoHotkey.chm
windows11-21h2-x64
1AutoHotkey.exe
windows11-21h2-x64
3Compiler/Ahk2Exe.exe
windows11-21h2-x64
7Compiler/A...SC.exe
windows11-21h2-x64
3Compiler/upx.exe
windows11-21h2-x64
7uninst.exe
windows11-21h2-x64
7Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/09/2024, 14:35
Behavioral task
behavioral1
Sample
AutoHotkey1000.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
AU3_Spy.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
AutoHotkey.chm
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
AutoHotkey.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Compiler/Ahk2Exe.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Compiler/AutoHotkeySC.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Compiler/upx.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
uninst.exe
Resource
win11-20240802-en
General
-
Target
Compiler/upx.exe
-
Size
92KB
-
MD5
6ef20e56d1f5eb53882e71a29701138e
-
SHA1
2b326e5003fc6f3ca35e33cad9263624974771c6
-
SHA256
67bac3b5650c719fbc15dcdb5ccb2dd07414876f6b55baa967342356d80357dd
-
SHA512
f9d7e6cdd2971e947a74b3c88b29fa92a75f517a098e1e77f7ae292bc64002683151fd654eb04b4b762325c4bd41a00356ade566f6213f2b9e0eae2f4ce83063
-
SSDEEP
1536:rch86wguitL/ZtMN0SYgrWZPpz8n5Ir6jPy1HqPWPCGwJs/5zwUOjVFLsm:cmnix/ZtdFgrWZd8nir31KuP7wJE5zC/
Malware Config
Signatures
-
resource yara_rule behavioral8/memory/4504-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral8/memory/4504-2-0x0000000000400000-0x000000000043A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upx.exe