Analysis
-
max time kernel
91s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:32
Behavioral task
behavioral1
Sample
b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe
Resource
win7-20240708-en
General
-
Target
b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe
-
Size
962KB
-
MD5
a2555f7135dc83836cd24500d00eb013
-
SHA1
5d1bfbc619354f64326a3ae012c7d09ba10ad844
-
SHA256
b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352
-
SHA512
970782dcd934a93611afd7d1866f5bd9c3f01a2881dac78ee0620f07b899e704c181eb272ae9fccab1e0668204688e516fe80de49371e4863a319dc0b73acec1
-
SSDEEP
24576:VD0tM85tbNJjldeYiYZ4kYtOPgSuAbhyXjEtspB7M/uj:VD0tM85DJjl/ioHYoPg3pjEepOA
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4668-6-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 4536 4668 b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe 83 -
resource yara_rule behavioral2/memory/4668-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/4668-6-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4668 b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4536 4668 b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe 83 PID 4668 wrote to memory of 4536 4668 b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe 83 PID 4668 wrote to memory of 4536 4668 b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe 83 PID 4668 wrote to memory of 4536 4668 b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe"C:\Users\Admin\AppData\Local\Temp\b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\b57765f66db48f1a3454d0893f2f147a2d3648eda10d17cc83a0b2215d8dc352.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-