Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe
Resource
win10v2004-20240611-en
General
-
Target
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe
-
Size
72KB
-
MD5
7f6d83f1ac2b0345018a761e846fd5f0
-
SHA1
1c583ee1a330e33c5c742b675d580e6befe9d90b
-
SHA256
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b
-
SHA512
0ca7eac6edffa8516387642678e46db1a2b40f354b4907302b7e548cb934d667369152fcf7cd92430aa0bc4ec1a00d2b33fd3cb3fdaf202e6662ecf4b829e6c4
-
SSDEEP
1536:xVU/dYYgahv7wBFcJhCzJyFP46pEg+gpbDiMwn:jU1YYgmv7GxyzpEg+gjwn
Malware Config
Signatures
-
Processes:
afmoatut.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" afmoatut.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
afmoatut.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\IsInstalled = "1" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\StubPath = "C:\\Windows\\system32\\oulloageaf.exe" afmoatut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254} afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" afmoatut.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
Processes:
afmoatut.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ecdopoad-idum.exe" afmoatut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe afmoatut.exe -
Executes dropped EXE 2 IoCs
Processes:
afmoatut.exeafmoatut.exepid process 2192 afmoatut.exe 2184 afmoatut.exe -
Loads dropped DLL 3 IoCs
Processes:
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exeafmoatut.exepid process 2352 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe 2352 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe 2192 afmoatut.exe -
Processes:
afmoatut.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" afmoatut.exe -
Modifies WinLogon 2 TTPs 5 IoCs
Processes:
afmoatut.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} afmoatut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\alfeatoav.dll" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" afmoatut.exe -
Drops file in System32 directory 9 IoCs
Processes:
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exeafmoatut.exedescription ioc process File created C:\Windows\SysWOW64\afmoatut.exe d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe File opened for modification C:\Windows\SysWOW64\oulloageaf.exe afmoatut.exe File created C:\Windows\SysWOW64\alfeatoav.dll afmoatut.exe File opened for modification C:\Windows\SysWOW64\afmoatut.exe afmoatut.exe File opened for modification C:\Windows\SysWOW64\afmoatut.exe d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe File created C:\Windows\SysWOW64\ecdopoad-idum.exe afmoatut.exe File created C:\Windows\SysWOW64\oulloageaf.exe afmoatut.exe File opened for modification C:\Windows\SysWOW64\alfeatoav.dll afmoatut.exe File opened for modification C:\Windows\SysWOW64\ecdopoad-idum.exe afmoatut.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
afmoatut.exeafmoatut.exepid process 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2184 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe 2192 afmoatut.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
afmoatut.exedescription pid process Token: SeDebugPrivilege 2192 afmoatut.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exeafmoatut.exedescription pid process target process PID 2352 wrote to memory of 2192 2352 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe afmoatut.exe PID 2352 wrote to memory of 2192 2352 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe afmoatut.exe PID 2352 wrote to memory of 2192 2352 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe afmoatut.exe PID 2352 wrote to memory of 2192 2352 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe afmoatut.exe PID 2192 wrote to memory of 436 2192 afmoatut.exe winlogon.exe PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 2184 2192 afmoatut.exe afmoatut.exe PID 2192 wrote to memory of 2184 2192 afmoatut.exe afmoatut.exe PID 2192 wrote to memory of 2184 2192 afmoatut.exe afmoatut.exe PID 2192 wrote to memory of 2184 2192 afmoatut.exe afmoatut.exe PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE PID 2192 wrote to memory of 1376 2192 afmoatut.exe Explorer.EXE
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe"C:\Users\Admin\AppData\Local\Temp\d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\afmoatut.exe"C:\Windows\SysWOW64\afmoatut.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\afmoatut.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
73KB
MD58ada4ee613ef0f7421c5491a30574413
SHA1c8515541793d5e81878dd6cff54a5ccb5f804c29
SHA2560cd4646b0c1f8b4c34168a95ca7440a51d95773a41de0b70e057dd981794b459
SHA512d734781acbb0241b3b9a13d286a245933f5639a8f74597147cad3436d19143c10ac0ed900f09a1d3e3e28081f98198ff68d914673bd4d2b13a16e022b3d60b88
-
Filesize
72KB
MD5cc586a47d221bd9bf2e16dffd963321d
SHA1bc78dece6f11c8b45574cbde19c73d6957801894
SHA2564e85e7d1bdb9893f78f313e84a8d16fbed231575c7ad085857afe9b9b958143b
SHA51256043481f15432e8a64cf64451152721a27c177cab83808defd913540167f46bec5b659f719b1bf3e55ead5229b67229cc427377eae6d7196a7fcfb6ea93eff1
-
Filesize
70KB
MD58f8a06ddbf957d0833ef69e4c28afcc0
SHA13252c6609153f83498d22263c920987621c2b6e3
SHA256fcaa666c4842b38312a71d3cbcf25ab8926694c4e99612190f17197931262877
SHA512ab033395253af7279a77a156c3e0982c016d353ad546b59ea09f2c9f5eeeca700ba00662d7b10ea7e0c707dc57c6fd047fd285f011c6e2c6abdb82d19ddc44e9