Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2025, 14:01
Behavioral task
behavioral1
Sample
New PO 127429.exe
Resource
win7-20241023-en
17 signatures
150 seconds
General
-
Target
New PO 127429.exe
-
Size
522KB
-
MD5
d30b1c7244ad844dab07ba6116385ce5
-
SHA1
e72b8f67a33b9acb2c52c8feb1bc3f61e801054e
-
SHA256
063da58edb72802cf74c1c113fe4107ede937b346b066356158d38724d13c1c8
-
SHA512
c874f5ea5d6c6081e11ebe98a8670bf37b34e8e11fa715ab99c7a3339ccd21731d65860696c04c81e078f6508cd722222c6d51a1d4ed883857837347183ba5a9
-
SSDEEP
12288:5quErHF6xC9D6DmR1J98w4oknqOOCyQfFRZWzsSnBFxNrn6IZjX:Mrl6kD68JmlotQfFyVnBFxNr6IZL
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4388-13-0x0000000000CD0000-0x0000000000E02000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/4388-0-0x0000000000CD0000-0x0000000000E02000-memory.dmp upx behavioral2/memory/4388-13-0x0000000000CD0000-0x0000000000E02000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1392 4388 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New PO 127429.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4388 New PO 127429.exe 4388 New PO 127429.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4388 New PO 127429.exe 4388 New PO 127429.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4388 New PO 127429.exe 4388 New PO 127429.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 3800 4388 New PO 127429.exe 88 PID 4388 wrote to memory of 3800 4388 New PO 127429.exe 88 PID 4388 wrote to memory of 3800 4388 New PO 127429.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\New PO 127429.exe"C:\Users\Admin\AppData\Local\Temp\New PO 127429.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\New PO 127429.exe"2⤵PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 6922⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4388 -ip 43881⤵PID:1020