Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 15:48
Behavioral task
behavioral1
Sample
GPL - INQUIRY-HQ242654.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GPL - INQUIRY-HQ242654.exe
Resource
win10v2004-20241007-en
General
-
Target
GPL - INQUIRY-HQ242654.exe
-
Size
937KB
-
MD5
bc7baa033dff24e20cf7180039f730f1
-
SHA1
e63aa08c5ff536cc60859e76223405a83d15af25
-
SHA256
ff8b7e1dd30b48c8c2144509dbf84b3103160a4fd8dcdb4341a782eb60592f0e
-
SHA512
88a9768b65c0d6b7af3f29c4e8b2326ad38f1866445e11ccf7d9deeb97669e3514519226c881e07aaf6f335f4ad4de462a1f3a3e56446fa659e1ec3700e75715
-
SSDEEP
24576:0thEVaPqLqn8vgIiregw+cVizAKDupFZZoJSyIU8is:IEVUcXVfPVWSxnis
Malware Config
Signatures
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2552-0-0x0000000000400000-0x00000000004E6000-memory.dmp autoit_exe behavioral1/memory/2552-4-0x0000000000400000-0x00000000004E6000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2552-0-0x0000000000400000-0x00000000004E6000-memory.dmp upx behavioral1/memory/2552-4-0x0000000000400000-0x00000000004E6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GPL - INQUIRY-HQ242654.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2552 GPL - INQUIRY-HQ242654.exe 2552 GPL - INQUIRY-HQ242654.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2552 GPL - INQUIRY-HQ242654.exe 2552 GPL - INQUIRY-HQ242654.exe