Analysis

  • max time kernel
    94s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 03:50

General

  • Target

    AutoPath.dll

  • Size

    585KB

  • MD5

    c3c98a96ea0dc067a99e8849f68acf04

  • SHA1

    39fecda52b89c54eef4d8ca6afd3eba6830ade82

  • SHA256

    2587cea708905b2a03f4dc335a7bccfd30392e6930fc511c812ba817f1c72106

  • SHA512

    85556c0b49ff2f53655f223288421222af80b11e8d222e5f7c7eec732d28a294d649444d7b8c037f8d2c40bcf4e5db72f77bf8a5592820d54b4f6c0283d81386

  • SSDEEP

    12288:eMGd+1VrxqXIxMciB9FhY9ttHCPyZQijOT7Ah7q98aC8w:Ko1V8XIxMci1+9t4yZzjGWaC

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\AutoPath.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\AutoPath.dll,#1
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:4876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 628
        3⤵
        • Program crash
        PID:5016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 652
        3⤵
        • Program crash
        PID:2020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4876 -ip 4876
    1⤵
      PID:3092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4876 -ip 4876
      1⤵
        PID:4700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\AutoPath.ini

        Filesize

        308B

        MD5

        24fef7f8afa1a6f6abef0b06b6d0ca59

        SHA1

        f384d7314fddd0d138efa6d49ee646a056e6c907

        SHA256

        2bae8ba4cb896465a76678048d7d9803e1089861743793bb89479de44a182713

        SHA512

        7805b91df1c61a2cb4a79c7a8ec5319bdf56970ad38499b141179ca8f959a2428bd6c3996fde16afe171ff0e0a3fadbe7784da1a50400bc6fafaedb37356bd2c

      • C:\Windows\SysWOW64\AutoPath.ini

        Filesize

        175B

        MD5

        390e4fa3b831c74563ff38785b7fbccd

        SHA1

        03f21e0d6ebad87d9475ca173f7555ce7fb864f7

        SHA256

        fddbc7d8408702e988cf6e291c8d239eaeb38df2c7752828d8894454c36b3c46

        SHA512

        826fc5ca459cb83dd12659101b630f03129364e575b88588aa3dc0a5014f6637461f118d6852ac49e34307eaef489e257aa766c07e1b1b597007e29550ad76d7

      • memory/4876-33-0x0000000000435000-0x000000000047E000-memory.dmp

        Filesize

        292KB

      • memory/4876-34-0x0000000000400000-0x0000000000497000-memory.dmp

        Filesize

        604KB

      • memory/4876-35-0x0000000000400000-0x0000000000497000-memory.dmp

        Filesize

        604KB