Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 02:56
Behavioral task
behavioral1
Sample
a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe
Resource
win7-20240903-en
General
-
Target
a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe
-
Size
520KB
-
MD5
6e891f3adbfd415fae70ff8376014769
-
SHA1
9dd2239eba106fe8b3b97992064d07c532a0c9ee
-
SHA256
a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b
-
SHA512
c125badd57a5acc02bb10091ac1fa4e6881ab9bca4df4f01f7dd61f4ac92795edacac8a0117603d4ec69a684e6752ab25d734c14a149f720314da1c33df35806
-
SSDEEP
12288:EOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPizdEsy9jgO1d5v5/BsuogV+a:Eq5TfcdHj4fmbGVWgO75B/h+a
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2204-8-0x0000000000130000-0x0000000000265000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2204-0-0x0000000000130000-0x0000000000265000-memory.dmp upx behavioral1/memory/2204-8-0x0000000000130000-0x0000000000265000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2204 a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe 2204 a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2204 a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe 2204 a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe"C:\Users\Admin\AppData\Local\Temp\a2504b173353b434fe409705dbc066fb36c9a74d45a36d89ee421a1da3b4461b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2204