Analysis
-
max time kernel
106s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
(?)#Androm-CGfxListView.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
koori.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
meow.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
srodus.exe
Resource
win10v2004-20231215-en
General
-
Target
(?)#Androm-CGfxListView.exe
-
Size
152KB
-
MD5
e2a3695183a53cf01c5fee5dd13afb45
-
SHA1
fb730909a89480728d243782558828d624089974
-
SHA256
894007e5d07de82a13d1ce44ddefbffcfb790d410e5fe01c7e04deb7e5b8464b
-
SHA512
2df11dbf31394a176eaa9277c1c61062e9a785e90ad89d714fa1eb2bfae98e91b57060b75d000eda64082e588d8b963f0a11a2df063f6cd0e8760fb744061823
-
SSDEEP
3072:wf4Zp1MIrIf4lO6VogYx4q+wZoCXiZxnLRmEj:LZpyIrIw1q+kPUL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
msiexec.exepid Process 2044 msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
(_)#Androm-CGfxListView.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IsSystemUpgradeComponentRegistered = "explorer \"C:\\Users\\Admin\\Documents\\msedge.exe\" " (_)#Androm-CGfxListView.exe -
Drops file in Program Files directory 1 IoCs
Processes:
(_)#Androm-CGfxListView.exedescription ioc Process File created C:\Program Files (x86)\msiexec.exe (_)#Androm-CGfxListView.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
(_)#Androm-CGfxListView.exemsiexec.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz (_)#Androm-CGfxListView.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msiexec.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 (_)#Androm-CGfxListView.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
(_)#Androm-CGfxListView.exemsiexec.exepid Process 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe 2044 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
(_)#Androm-CGfxListView.exepid Process 5028 (_)#Androm-CGfxListView.exe 5028 (_)#Androm-CGfxListView.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
(_)#Androm-CGfxListView.exedescription pid Process procid_target PID 5028 wrote to memory of 2044 5028 (_)#Androm-CGfxListView.exe 91 PID 5028 wrote to memory of 2044 5028 (_)#Androm-CGfxListView.exe 91 PID 5028 wrote to memory of 2044 5028 (_)#Androm-CGfxListView.exe 91 PID 5028 wrote to memory of 2044 5028 (_)#Androm-CGfxListView.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\(_)#Androm-CGfxListView.exe"C:\Users\Admin\AppData\Local\Temp\(_)#Androm-CGfxListView.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\msiexec.exe"C:\Program Files (x86)\msiexec.exe" -Puppet2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD59d09dc1eda745a5f87553048e57620cf
SHA11d0c7cfca8104d06de1f08b97f28b3520c246cd7
SHA2563a90ede157d40a4db7859158c826f7b4d0f19a5768f6483c9be6ee481c6e1af7
SHA5122be940f0468f77792c6e1b593376900c24ff0b0fae8dc2e57b05596506789aa76119f8be780c57252f74cd1f0c2fa7223fe44ae4fa3643c26df00dd42bd4c016
-
Filesize
152KB
MD5e2a3695183a53cf01c5fee5dd13afb45
SHA1fb730909a89480728d243782558828d624089974
SHA256894007e5d07de82a13d1ce44ddefbffcfb790d410e5fe01c7e04deb7e5b8464b
SHA5122df11dbf31394a176eaa9277c1c61062e9a785e90ad89d714fa1eb2bfae98e91b57060b75d000eda64082e588d8b963f0a11a2df063f6cd0e8760fb744061823