Analysis

  • max time kernel
    9s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7-20241010-de
  • resource tags

    arch:x64arch:x86image:win7-20241010-delocale:de-deos:windows7-x64systemwindows
  • submitted
    08-02-2025 21:34

Errors

Reason
Machine shutdown

General

  • Target

    installer.exe

  • Size

    4.0MB

  • MD5

    72b68bfac010ae63e27664861e1c75fa

  • SHA1

    9e3e0dd6a8d2f162a48bf4fd769b506f5850f3eb

  • SHA256

    4417ff02be98035b74555c610fd564d5440373972bdb97b026122adf5d989852

  • SHA512

    ffc626c3fedcbaf1ad674eae0cf5fe532af720a0e1a5a53b5bae094481d6b327d5468c9c8da9c1d31908c24d9be4fa1d4028b6ae36e9f3f6614f2a8783ef0ab9

  • SSDEEP

    49152:aR/KpmZubwf2S8W2ILeWl+C1p9jWy5Snd0eigX+lluBLflz0Lk/rfSxnN3Tz64IY:8/jeYLP1Sy5E0Yplz0Lk/INXUraBA/4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs

    Using AutoIT for possible automate script.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\installer.exe
    "C:\Users\Admin\AppData\Local\Temp\installer.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:824
    • \??\c:\temp\test\Autoit3.exe
      "c:\temp\test\Autoit3.exe" c:\temp\test\script.a3x
      2⤵
      • Executes dropped EXE
      • Command and Scripting Interpreter: AutoIT
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1516
      • \??\c:\windows\SysWOW64\cmd.exe
        "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\ecccbfc\hdhgkdc
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ComputerSystem get domain
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1888
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2812
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2492

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\ecccbfc\hdhgkdc

        Filesize

        54B

        MD5

        c8bbad190eaaa9755c8dfb1573984d81

        SHA1

        17ad91294403223fde66f687450545a2bad72af5

        SHA256

        7f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac

        SHA512

        05f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df

      • \??\c:\temp\test\script.a3x

        Filesize

        582KB

        MD5

        00827b8cddba776d6f1efe6ccbee5ba8

        SHA1

        f95c000f3b75114a3c718d4f25a746b3d447320e

        SHA256

        28de3de19d2710510cff515e3fed683105ba1da0f644961f0a499b8f610e22c8

        SHA512

        88fd8750e47fbcc847bf61a3932435ff35520ede61e211af6dc070d218cef7dac552e0979da84cdd4561c0e182ea3f62ad8d806040fd7d0e9c1b45f88cf3d36f

      • \temp\test\Autoit3.exe

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • memory/824-0-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/824-7-0x0000000003530000-0x0000000005344000-memory.dmp

        Filesize

        30.1MB

      • memory/824-2-0x0000000005350000-0x0000000007168000-memory.dmp

        Filesize

        30.1MB

      • memory/824-14-0x0000000000400000-0x0000000000805000-memory.dmp

        Filesize

        4.0MB