Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 01:32
Behavioral task
behavioral1
Sample
eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe
Resource
win7-20241010-en
General
-
Target
eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe
-
Size
771KB
-
MD5
6de815a10400800fc5cab138318fe07a
-
SHA1
c14b5f38c05397d9171033fe40db5e71ab5825ac
-
SHA256
eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f
-
SHA512
b2dc2321b18c4b639824f9d43a9e74adf8dfceba101d1554fb87b200748deb5a1c8934477e75ad70cf4018dd31af779033fdb8a15ce934bb57aa4b2030b0ede6
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLERO6KZRF6zWgdsWfw3YG4tsasr9MEgXlkQhjlXNyV:tthEVaPqLthMwDcf5VkQdlXNfO
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2448-4-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2448-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2448-4-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2448 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 2448 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2448 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 2448 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe"C:\Users\Admin\AppData\Local\Temp\eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2448