Resubmissions

03/12/2024, 16:09

241203-tl83jaxrfr 7

03/12/2024, 16:06

241203-tkhh7axqhj 8

Analysis

  • max time kernel
    440s
  • max time network
    441s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2024, 16:09

General

  • Target

    AutoHotkey_1.1.37.02_setup.exe

  • Size

    3.3MB

  • MD5

    c2e8062052bb2b25d4951b78ba9a5e73

  • SHA1

    947dbf6343d632fc622cc2920d0ad303c32fcc80

  • SHA256

    49a48e879f7480238d2fe17520ac19afe83685aac0b886719f9e1eac818b75cc

  • SHA512

    c9a5ea57842f69223bd32a9b9e4aaad44d422f56e362469299f56d8b34b5e8bbf2b51d4e64d2bebe6c95d6d8545a8a88e6107b9b0a813e469f613e1353aad7a4

  • SSDEEP

    98304:m7EROaI2yEbVidvdahm6QAxuE4iLqmzLdtte96g:m4FyMVq4og4iLqmNqMg

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.37.02_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\AutoHotkey_1.1.37.02_setup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\7z777BA258\setup.exe
      C:\Users\Admin\AppData\Local\Temp\7z777BA258\setup.exe
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7z777BA258\setup.exe

    Filesize

    872KB

    MD5

    b98ee9e00b5546763f9c6e65e436f6e6

    SHA1

    a28e2b0ba6cc748d166b2eb6d0c8acb0bd3b9f3b

    SHA256

    6d876c526b5cbc5dc5341c1011b1c91639597f46677a1d42426f4a52dfea6756

    SHA512

    556e632fe39231622398c5afccc51d01f25bc430705a126737877ed9f354c7076b5bf3cbac27f8a1c4db4d326b6a8848fae4b8d6046f816597c370d06e824591

  • memory/4996-48-0x0000000000AA0000-0x0000000000BA0000-memory.dmp

    Filesize

    1024KB

  • memory/4996-47-0x0000000000AA0000-0x0000000000BA0000-memory.dmp

    Filesize

    1024KB

  • memory/4996-49-0x0000000000AA0000-0x0000000000BA0000-memory.dmp

    Filesize

    1024KB

  • memory/4996-50-0x0000000000AA0000-0x0000000000BA0000-memory.dmp

    Filesize

    1024KB