Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe
Resource
win10v2004-20221111-en
General
-
Target
39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe
-
Size
278KB
-
MD5
fed206ff1b750ccb5c4d096e01a9f8ed
-
SHA1
961890630651298ec5b76ea1052e551ed9ce0ae9
-
SHA256
39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046
-
SHA512
b4199b485f8fe2961799f47c628f37283be965bd8de1c3b24a08e306a7d5b962c76dd6208585739ee01c8a3202621964eaeb172ee6a3f631fda85fc0c2eee17b
-
SSDEEP
6144:BDYuTFEvolzDFAXPvlM2OzgnM+aWne3+A7ZCUYotf7:pFWvG2C2FnPUR7ZCUYM7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1480 agala.exe -
Deletes itself 1 IoCs
pid Process 568 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run agala.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Cedia\\agala.exe" agala.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 968 set thread context of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe 1480 agala.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe Token: SeSecurityPrivilege 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe Token: SeSecurityPrivilege 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 1480 agala.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 968 wrote to memory of 1480 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 27 PID 968 wrote to memory of 1480 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 27 PID 968 wrote to memory of 1480 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 27 PID 968 wrote to memory of 1480 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 27 PID 1480 wrote to memory of 1224 1480 agala.exe 16 PID 1480 wrote to memory of 1224 1480 agala.exe 16 PID 1480 wrote to memory of 1224 1480 agala.exe 16 PID 1480 wrote to memory of 1224 1480 agala.exe 16 PID 1480 wrote to memory of 1224 1480 agala.exe 16 PID 1480 wrote to memory of 1312 1480 agala.exe 15 PID 1480 wrote to memory of 1312 1480 agala.exe 15 PID 1480 wrote to memory of 1312 1480 agala.exe 15 PID 1480 wrote to memory of 1312 1480 agala.exe 15 PID 1480 wrote to memory of 1312 1480 agala.exe 15 PID 1480 wrote to memory of 1380 1480 agala.exe 14 PID 1480 wrote to memory of 1380 1480 agala.exe 14 PID 1480 wrote to memory of 1380 1480 agala.exe 14 PID 1480 wrote to memory of 1380 1480 agala.exe 14 PID 1480 wrote to memory of 1380 1480 agala.exe 14 PID 1480 wrote to memory of 968 1480 agala.exe 26 PID 1480 wrote to memory of 968 1480 agala.exe 26 PID 1480 wrote to memory of 968 1480 agala.exe 26 PID 1480 wrote to memory of 968 1480 agala.exe 26 PID 1480 wrote to memory of 968 1480 agala.exe 26 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28 PID 968 wrote to memory of 568 968 39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe"C:\Users\Admin\AppData\Local\Temp\39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Roaming\Cedia\agala.exe"C:\Users\Admin\AppData\Roaming\Cedia\agala.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc4151a71.bat"3⤵
- Deletes itself
PID:568
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1312
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5a9ff33d22da20fabc14cf204ab34ab20
SHA16ba75c1209e5fea02580aea55f225e1c687b38b3
SHA2563258bb42fddbc7ab3c365785345c2570239b1d736753fadf0cb70f05b563dc99
SHA51220014e7c42592004f4b935bea2f8532295c3fe4e50f28a7e95f8adcf519fd28c47de4fd85ad432ecc24fecb1230b49062dbe5b1b097a8343d0bced7921f08568
-
Filesize
278KB
MD5c4529ef2c0d5401d9f84b6d490a5ff28
SHA13ce2f170a822de20912510ae841ea68abdf598d6
SHA256c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903
SHA512587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83
-
Filesize
278KB
MD5c4529ef2c0d5401d9f84b6d490a5ff28
SHA13ce2f170a822de20912510ae841ea68abdf598d6
SHA256c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903
SHA512587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83
-
Filesize
398B
MD589d1a6f8a5d98a66347a18579c839115
SHA184b71bc88eb8e3cc83a070f9b3884e1cdeb96d66
SHA2568d3451bd1059544cc1fd27534c7d8d80ac03a5a64235425b00df4302ce3d260c
SHA5122b9237773bce027e3abbbe89244b0d302cba5032c492309d8f8897b8cc80378666822da1cbb99b8e7e80231cb7a79a8bcfe0ebf9c5be4d5c490f770bf94e5ce1
-
Filesize
278KB
MD5c4529ef2c0d5401d9f84b6d490a5ff28
SHA13ce2f170a822de20912510ae841ea68abdf598d6
SHA256c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903
SHA512587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83
-
Filesize
278KB
MD5c4529ef2c0d5401d9f84b6d490a5ff28
SHA13ce2f170a822de20912510ae841ea68abdf598d6
SHA256c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903
SHA512587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83