Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe
Resource
win10v2004-20240611-en
General
-
Target
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe
-
Size
72KB
-
MD5
7f6d83f1ac2b0345018a761e846fd5f0
-
SHA1
1c583ee1a330e33c5c742b675d580e6befe9d90b
-
SHA256
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b
-
SHA512
0ca7eac6edffa8516387642678e46db1a2b40f354b4907302b7e548cb934d667369152fcf7cd92430aa0bc4ec1a00d2b33fd3cb3fdaf202e6662ecf4b829e6c4
-
SSDEEP
1536:xVU/dYYgahv7wBFcJhCzJyFP46pEg+gpbDiMwn:jU1YYgmv7GxyzpEg+gjwn
Malware Config
Signatures
-
Processes:
afmoatut.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" afmoatut.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
afmoatut.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{454A4546-4344-4e4b-454A-454643444e4b} afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{454A4546-4344-4e4b-454A-454643444e4b}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{454A4546-4344-4e4b-454A-454643444e4b}\IsInstalled = "1" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{454A4546-4344-4e4b-454A-454643444e4b}\StubPath = "C:\\Windows\\system32\\oulloageaf.exe" afmoatut.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
Processes:
afmoatut.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ecdopoad-idum.exe" afmoatut.exe -
Executes dropped EXE 2 IoCs
Processes:
afmoatut.exeafmoatut.exepid process 2596 afmoatut.exe 724 afmoatut.exe -
Processes:
afmoatut.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" afmoatut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" afmoatut.exe -
Modifies WinLogon 2 TTPs 5 IoCs
Processes:
afmoatut.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\alfeatoav.dll" afmoatut.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" afmoatut.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} afmoatut.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify afmoatut.exe -
Drops file in System32 directory 9 IoCs
Processes:
afmoatut.exed7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ecdopoad-idum.exe afmoatut.exe File created C:\Windows\SysWOW64\ecdopoad-idum.exe afmoatut.exe File opened for modification C:\Windows\SysWOW64\alfeatoav.dll afmoatut.exe File created C:\Windows\SysWOW64\alfeatoav.dll afmoatut.exe File opened for modification C:\Windows\SysWOW64\afmoatut.exe d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe File created C:\Windows\SysWOW64\afmoatut.exe d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe File opened for modification C:\Windows\SysWOW64\oulloageaf.exe afmoatut.exe File created C:\Windows\SysWOW64\oulloageaf.exe afmoatut.exe File opened for modification C:\Windows\SysWOW64\afmoatut.exe afmoatut.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
afmoatut.exeafmoatut.exepid process 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 724 afmoatut.exe 724 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe 2596 afmoatut.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
afmoatut.exedescription pid process Token: SeDebugPrivilege 2596 afmoatut.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exeafmoatut.exedescription pid process target process PID 3364 wrote to memory of 2596 3364 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe afmoatut.exe PID 3364 wrote to memory of 2596 3364 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe afmoatut.exe PID 3364 wrote to memory of 2596 3364 d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe afmoatut.exe PID 2596 wrote to memory of 724 2596 afmoatut.exe afmoatut.exe PID 2596 wrote to memory of 724 2596 afmoatut.exe afmoatut.exe PID 2596 wrote to memory of 724 2596 afmoatut.exe afmoatut.exe PID 2596 wrote to memory of 624 2596 afmoatut.exe winlogon.exe PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE PID 2596 wrote to memory of 3424 2596 afmoatut.exe Explorer.EXE
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe"C:\Users\Admin\AppData\Local\Temp\d7743a7e9b917cc1bc7c712817eb66e81056e8bef09fe4b7ada2830901ca087b.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\afmoatut.exe"C:\Windows\SysWOW64\afmoatut.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\afmoatut.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD58f8a06ddbf957d0833ef69e4c28afcc0
SHA13252c6609153f83498d22263c920987621c2b6e3
SHA256fcaa666c4842b38312a71d3cbcf25ab8926694c4e99612190f17197931262877
SHA512ab033395253af7279a77a156c3e0982c016d353ad546b59ea09f2c9f5eeeca700ba00662d7b10ea7e0c707dc57c6fd047fd285f011c6e2c6abdb82d19ddc44e9
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
73KB
MD58387da56b2ead94f60439d93b54d8246
SHA14db272ae9847379348726cf1d670153dd5e3cff3
SHA2568f65108ddc95bc94522d96d0aebbff490667c9a3910e4a2a0c5e9ae51ad68838
SHA512c759d166145174225c862d108bb8a506bdbb22dc47bbe9ad5d3dde3f6885cba8caafe7fb97213b9d94383ed0f72682fca949c4f7e8cfe561e3808ecb65824d58
-
Filesize
72KB
MD50cd63fdf06fc1d4539b9fca8e8db5988
SHA1a16bb31a2de0696efc4257b67ff8eaefcfcf7e82
SHA2562943d4e01f96655ec6a92c1ee403a4e7c8ffb987dfc859144e5803d028d2d9b8
SHA512ab2f718754b3572be43dd4b494ce7c1fd3ecef14c2d5e341bf1989d8ab64ff7d73c2d850a47a0d6708156a0a8fe2f9450ee8b31696b6e525f44911b26809637d