Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 07:20
Behavioral task
behavioral1
Sample
e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe
Resource
win7-20240903-en
General
-
Target
e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe
-
Size
1.7MB
-
MD5
ea95d5c8cbd2057f690affb7dea8049b
-
SHA1
7eb10e65700d7d79d2b398f5fc5383dfa421f733
-
SHA256
e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf
-
SHA512
e00beb85a726cdc7751f205134e3d8caad0bbd8c3480951398002fbb68ef6d57c7281cacc8ebf5fc2ca436bdded4646ea5f60fb4c961ff2579e018c83f967734
-
SSDEEP
24576:xthEVaPqLB/OXA8faoMTRpyikthEVaPqLB/OXA8faoMTRpyix:pEVUcwkB3V4EVUcwkB3Vx
Malware Config
Signatures
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1228-8-0x0000000000400000-0x0000000000516000-memory.dmp autoit_exe behavioral2/memory/3980-11-0x0000000000400000-0x0000000000516000-memory.dmp autoit_exe behavioral2/memory/1228-25-0x0000000000400000-0x0000000000516000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1228 set thread context of 2788 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 83 -
resource yara_rule behavioral2/memory/3980-0-0x0000000000400000-0x0000000000516000-memory.dmp upx behavioral2/memory/1228-8-0x0000000000400000-0x0000000000516000-memory.dmp upx behavioral2/memory/3980-11-0x0000000000400000-0x0000000000516000-memory.dmp upx behavioral2/memory/1228-25-0x0000000000400000-0x0000000000516000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2536 2788 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3980 wrote to memory of 1228 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 82 PID 3980 wrote to memory of 1228 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 82 PID 3980 wrote to memory of 1228 3980 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 82 PID 1228 wrote to memory of 2788 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 83 PID 1228 wrote to memory of 2788 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 83 PID 1228 wrote to memory of 2788 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 83 PID 1228 wrote to memory of 2788 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 83 PID 1228 wrote to memory of 2788 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 83 PID 1228 wrote to memory of 2788 1228 e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe"C:\Users\Admin\AppData\Local\Temp\e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exeC:\Users\Admin\AppData\Local\Temp\e65723a395c55f4757594df4365384327d4cf2256004e3bfbeb1f8fd35c65fbf.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\test.a3x"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
\??\c:\windows\SysWOW64\svchost.exe"c:\windows\system32\svchost.exe"3⤵PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 204⤵
- Program crash
PID:2536
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2788 -ip 27881⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD54e4cddd13c848074c11d4f1d291c6aba
SHA153e0002cead55ba20ef6261b1a43967e612fb558
SHA2564070ad29af1c0328ceec6b7032f2ff7fa94ee4adaead367f32c549d13ebbcf77
SHA512261bca93ac6b50af8c96b22d74b5a740380516869b3773c5f162924e8825770ebf6b65da83ac578cb592cfe9997bee8433e55648d32c2f2da83297904fbebb76