Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe
Resource
win10v2004-20241007-en
General
-
Target
a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe
-
Size
930KB
-
MD5
dab02bda6040baa9dd55a267c40ef2ed
-
SHA1
a114305562ece266d18b72f247651791f509f95e
-
SHA256
a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c
-
SHA512
b7325b4ad753c6fbec4c2ea6397edb9e686ec9896414f988abceb6a567a8f941381a225e4c39ca7acf9fe4dc2a5143392e8f01b2de0d740d6aefef70caf15ffa
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLmA61Ksm6EX7q8o2sE8mMLH:f3v+7/5QLmv1JKWbX7
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2236-2-0x0000000004150000-0x0000000004350000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1572 2236 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2236 a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe 2236 a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2236 a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe 2236 a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1788 2236 a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe 86 PID 2236 wrote to memory of 1788 2236 a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe 86 PID 2236 wrote to memory of 1788 2236 a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe"C:\Users\Admin\AppData\Local\Temp\a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\a3d4af8e960db3a71927f672f29ece4963dd200965f9d3ddd3a2db8d4150f53c.exe"2⤵PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 7402⤵
- Program crash
PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2236 -ip 22361⤵PID:1952