Analysis
-
max time kernel
16s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 14:02
Behavioral task
behavioral1
Sample
FDR9876567000.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
FDR9876567000.exe
Resource
win10v2004-20241007-en
General
-
Target
FDR9876567000.exe
-
Size
833KB
-
MD5
c517ecc1d57af03affdd6945e1b618d8
-
SHA1
5c5174ebdf5902ada7c5899b6c0b98f2db363372
-
SHA256
9a32e0821da4466b858ecfd185f3d9bff232d8a3b44983988c248df05ef7c2ef
-
SHA512
355c1f39946662b0c16c6a5fa4c387aad03e1dc1c1dd74d650a784fc9e718b890a877937d8d3a26ab62a22385f03e02e6d0faa6d9e07ea3b16151c909596097a
-
SSDEEP
12288:5quErHF6xC9D6DmR1J98w4oknqOOCyQfY7nPIsUgzp6x0hFxZAXFbuFb7anFbq44:Mrl6kD68JmlotQfgEYpOqFxTlaVXSxz
Malware Config
Signatures
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1856-0-0x0000000000140000-0x000000000030E000-memory.dmp autoit_exe behavioral1/memory/1856-8-0x0000000000140000-0x000000000030E000-memory.dmp autoit_exe -
Processes:
resource yara_rule behavioral1/memory/1856-0-0x0000000000140000-0x000000000030E000-memory.dmp upx behavioral1/memory/1856-8-0x0000000000140000-0x000000000030E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FDR9876567000.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FDR9876567000.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
FDR9876567000.exepid Process 1856 FDR9876567000.exe 1856 FDR9876567000.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
FDR9876567000.exepid Process 1856 FDR9876567000.exe 1856 FDR9876567000.exe