Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 14:17
Behavioral task
behavioral1
Sample
NOGHCV09800.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NOGHCV09800.exe
Resource
win10v2004-20241007-en
General
-
Target
NOGHCV09800.exe
-
Size
1.4MB
-
MD5
52213367d8528d5da7e3ed356d80ddc3
-
SHA1
f99fa064f78f516f7b4e6a0167fc54a193cd642d
-
SHA256
17a545082a45c4c219bd09093349cb12cafef84e37a8dd989b6382a434b89544
-
SHA512
a1d4fadf5dbfb32bdc6939b12d0f11c09be991fb1a397d4bfe97db880baf0d8803103be5166993038b79b8ec3f03122c4e44703d7485a6b77bc97c17a777472e
-
SSDEEP
24576:CiUmSB/o5d1ubcvI9/0XhFXSQMJ/ZDfJvXnaPw9Qs287sKeXnusOag6hj3:C/mU/ohubcvIx0xFXtMr7JvXa4x28Knt
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2384-4-0x00000000011B0000-0x0000000001497000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2384-0-0x00000000011B0000-0x0000000001497000-memory.dmp upx behavioral1/memory/2384-4-0x00000000011B0000-0x0000000001497000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOGHCV09800.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2384 NOGHCV09800.exe 2384 NOGHCV09800.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2384 NOGHCV09800.exe 2384 NOGHCV09800.exe