Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe
Resource
win10v2004-20221111-en
General
-
Target
e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe
-
Size
134KB
-
MD5
bec37dc6fb25b7b4f6425e9b3fcd1913
-
SHA1
a71b41b5e48d31f11760065184f201eb43c8f126
-
SHA256
e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
-
SHA512
4217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966
-
SSDEEP
3072:t76QdbUdLdpKtnJapppppu12ygjOcO8LZZ:t76IaLCapppppK2VScp
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
audiodg.exeaudiodg.exeaudiodg.exepid process 1736 audiodg.exe 636 audiodg.exe 1944 audiodg.exe -
Modifies Installed Components in the registry 2 TTPs 6 IoCs
Processes:
audiodg.exeaudiodg.exeaudiodg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{88EB3725-F97E-4C37-9CE8-0A928A20320C} audiodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88EB3725-F97E-4C37-9CE8-0A928A20320C}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google Products\\audiodg.exe\" -w" audiodg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{88EB3725-F97E-4C37-9CE8-0A928A20320C} audiodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88EB3725-F97E-4C37-9CE8-0A928A20320C}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google Products\\audiodg.exe\" -w" audiodg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{88EB3725-F97E-4C37-9CE8-0A928A20320C} audiodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88EB3725-F97E-4C37-9CE8-0A928A20320C}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google Products\\audiodg.exe\" -w" audiodg.exe -
Deletes itself 1 IoCs
Processes:
audiodg.exepid process 1736 audiodg.exe -
Loads dropped DLL 3 IoCs
Processes:
e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exeaudiodg.exeaudiodg.exepid process 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe 1736 audiodg.exe 636 audiodg.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
audiodg.exeaudiodg.exeaudiodg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run audiodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Google Products = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google Products\\audiodg.exe\" -w" audiodg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run audiodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Google Products = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google Products\\audiodg.exe\" -w" audiodg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run audiodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Google Products = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google Products\\audiodg.exe\" -w" audiodg.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
audiodg.exepid process 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe 1944 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
audiodg.exedescription pid process Token: SeDebugPrivilege 1944 audiodg.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exeaudiodg.exeaudiodg.exeaudiodg.exepid process 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe 1736 audiodg.exe 636 audiodg.exe 1944 audiodg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exeaudiodg.exeaudiodg.exedescription pid process target process PID 956 wrote to memory of 316 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe cmd.exe PID 956 wrote to memory of 316 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe cmd.exe PID 956 wrote to memory of 316 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe cmd.exe PID 956 wrote to memory of 316 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe cmd.exe PID 956 wrote to memory of 1736 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe audiodg.exe PID 956 wrote to memory of 1736 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe audiodg.exe PID 956 wrote to memory of 1736 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe audiodg.exe PID 956 wrote to memory of 1736 956 e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe audiodg.exe PID 1736 wrote to memory of 636 1736 audiodg.exe audiodg.exe PID 1736 wrote to memory of 636 1736 audiodg.exe audiodg.exe PID 1736 wrote to memory of 636 1736 audiodg.exe audiodg.exe PID 1736 wrote to memory of 636 1736 audiodg.exe audiodg.exe PID 636 wrote to memory of 1944 636 audiodg.exe audiodg.exe PID 636 wrote to memory of 1944 636 audiodg.exe audiodg.exe PID 636 wrote to memory of 1944 636 audiodg.exe audiodg.exe PID 636 wrote to memory of 1944 636 audiodg.exe audiodg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe"C:\Users\Admin\AppData\Local\Temp\e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.execmd /D /R type "C:\Users\Admin\AppData\Local\Temp\e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe" > "C:\Users\Admin\AppData\Roaming\Google Products\audiodg.exe"2⤵PID:316
-
-
C:\Users\Admin\AppData\Roaming\Google Products\audiodg.exe"C:\Users\Admin\AppData\Roaming\Google Products\audiodg.exe" -m "C:\Users\Admin\AppData\Local\Temp\e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8.exe"2⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Deletes itself
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\Google Products\audiodg.exe"C:\Users\Admin\AppData\Roaming\Google Products\audiodg.exe" -w3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Roaming\Google Products\audiodg.exe"C:\Users\Admin\AppData\Roaming\Google Products\audiodg.exe4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1944
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5bec37dc6fb25b7b4f6425e9b3fcd1913
SHA1a71b41b5e48d31f11760065184f201eb43c8f126
SHA256e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
SHA5124217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966
-
Filesize
134KB
MD5bec37dc6fb25b7b4f6425e9b3fcd1913
SHA1a71b41b5e48d31f11760065184f201eb43c8f126
SHA256e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
SHA5124217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966
-
Filesize
134KB
MD5bec37dc6fb25b7b4f6425e9b3fcd1913
SHA1a71b41b5e48d31f11760065184f201eb43c8f126
SHA256e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
SHA5124217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966
-
Filesize
134KB
MD5bec37dc6fb25b7b4f6425e9b3fcd1913
SHA1a71b41b5e48d31f11760065184f201eb43c8f126
SHA256e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
SHA5124217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966
-
Filesize
134KB
MD5bec37dc6fb25b7b4f6425e9b3fcd1913
SHA1a71b41b5e48d31f11760065184f201eb43c8f126
SHA256e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
SHA5124217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966
-
Filesize
134KB
MD5bec37dc6fb25b7b4f6425e9b3fcd1913
SHA1a71b41b5e48d31f11760065184f201eb43c8f126
SHA256e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
SHA5124217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966
-
Filesize
134KB
MD5bec37dc6fb25b7b4f6425e9b3fcd1913
SHA1a71b41b5e48d31f11760065184f201eb43c8f126
SHA256e58516e526b26eddcac84fa810b386d33ed2dc379af1ab2a011ce4fb3033d7d8
SHA5124217aeb7d9ac6666867fc5c62db0ae3a7f5edd4beb504135f3e6c0c3ea4654415434e2581efd9255d466cde7aa27698b2d2d5560576b84052a5ed97a99b74966