Overview
overview
10Static
static
53666991ba9...23.exe
windows7-x64
73666991ba9...23.exe
windows10-2004-x64
7375aead107...8a.exe
windows7-x64
7375aead107...8a.exe
windows10-2004-x64
73a55a5e059...66.exe
windows7-x64
53a55a5e059...66.exe
windows10-2004-x64
53a5c360865...0a.exe
windows7-x64
53a5c360865...0a.exe
windows10-2004-x64
53a8196dc93...03.exe
windows7-x64
53a8196dc93...03.exe
windows10-2004-x64
53b2e4fc5bb...0c.exe
windows7-x64
53b2e4fc5bb...0c.exe
windows10-2004-x64
53c81cd2032...fe.exe
windows7-x64
103c81cd2032...fe.exe
windows10-2004-x64
103d134d4900...24.exe
windows7-x64
103d134d4900...24.exe
windows10-2004-x64
103fe4c784df...64.exe
windows7-x64
53fe4c784df...64.exe
windows10-2004-x64
540f9a44672...69.exe
windows7-x64
1040f9a44672...69.exe
windows10-2004-x64
10417d576bf1...b0.exe
windows7-x64
5417d576bf1...b0.exe
windows10-2004-x64
541ac704c7b...ad.exe
windows7-x64
741ac704c7b...ad.exe
windows10-2004-x64
742a09e7356...2c.exe
windows7-x64
1042a09e7356...2c.exe
windows10-2004-x64
1044b1b50b00...7f.exe
windows7-x64
544b1b50b00...7f.exe
windows10-2004-x64
5450fcf9d11...04.exe
windows7-x64
5450fcf9d11...04.exe
windows10-2004-x64
546836f3afb...d5.exe
windows7-x64
646836f3afb...d5.exe
windows10-2004-x64
6Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 07:24
Behavioral task
behavioral1
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win10v2004-20241007-en
General
-
Target
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
-
Size
766KB
-
MD5
187b48ce81a690f2db84c8fcaff8170a
-
SHA1
d3f7f27cd5fad9396ccfe71270b3cb0ad440cdff
-
SHA256
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f
-
SHA512
8cc46d488e3b6e1631fde6795b8184953d79ead140eb067c85fe14b07f822eda6d08f3ae57af3102fb1776a9d9068d1f7846552e4f85fd93ffd5ea789968d27a
-
SSDEEP
12288:LOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPikiEAmDOvFR/qOK9U4E6bWbGO3SA4P:Lq5TfcdHj4fmbTinR/ZK9rEXeJ913
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral28/memory/2532-12-0x00000000009D0000-0x0000000000B81000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2532 set thread context of 2328 2532 44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe 81 -
resource yara_rule behavioral28/memory/2532-0-0x00000000009D0000-0x0000000000B81000-memory.dmp upx behavioral28/memory/2532-12-0x00000000009D0000-0x0000000000B81000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2532 44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2328 2532 44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe 81 PID 2532 wrote to memory of 2328 2532 44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe 81 PID 2532 wrote to memory of 2328 2532 44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe 81 PID 2532 wrote to memory of 2328 2532 44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe"C:\Users\Admin\AppData\Local\Temp\44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5b2b6e8ba94c20df19ca09d021027deca
SHA1c9a82da40b81d7817f45d37f0c27c3c8768c4e77
SHA256e0306c652ef8e39ff8c3a8b09926c6ca1396d9d68fc2d57a620754df1b4db054
SHA512148d542c2502aa00084fdcef7057a72fa04440b2507104c5bdf924f3d4d71cf2564a9c69fb541bd5cd9075bd9f94d84da03e956f44e81ae79f410847e6cc9769