Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
Aragami V1.03 Trainer +3 MrAntiFun.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Aragami V1.03 Trainer +3 MrAntiFun.exe
Resource
win10v2004-20240802-en
General
-
Target
Aragami V1.03 Trainer +3 MrAntiFun.exe
-
Size
4.5MB
-
MD5
f3438dd053a7ae8ad3e53301a3dbe332
-
SHA1
2963301db0d10ed855e5e853377eb4629d891192
-
SHA256
1c68ff9cf1aeb566c74093e03a3360a9c5329c3f1a04bf7b7827429387488408
-
SHA512
d18bb468396bac023648f3e4d733691fa37a601fc4fc8415ad905ce749c175d32e23d750a3726803c5b89638d7d8e78e90fe74f738e49fd4ccf8dcf784e394c4
-
SSDEEP
98304:g9i6VaN2JKc/vom18UvDQ6ZgXsNDeY9b:KiCpFZdLb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1912 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe -
Loads dropped DLL 1 IoCs
pid Process 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\System32\user32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\gdi32full.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\shcore.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\system32\explorerframe.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\TextShaping.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\KERNEL32.DLL Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\RPCRT4.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\clbcatq.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\winmm.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\shell32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\imagehlp.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\SHLWAPI.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\profapi.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\KERNELBASE.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\ucrtbase.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\ole32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\comdlg32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\apphelp.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\GDI32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\psapi.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\version.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\wininet.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\system32\uxtheme.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\MSCTF.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\combase.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\advapi32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\bcryptPrimitives.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\msvcrt.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\system32\shfolder.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\win32u.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\imm32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\sechost.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\ws2_32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\opengl32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\windows.storage.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\Wldp.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\SYSTEM32\Dbghelp.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\oleaut32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe File opened for modification C:\Windows\System32\msvcp_win.dll Aragami V1.03 Trainer +3 MrAntiFun.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\comctl32.dll Aragami V1.03 Trainer +3 MrAntiFun.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aragami V1.03 Trainer +3 MrAntiFun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aragami V1.03 Trainer +3 MrAntiFun.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeTcbPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeTcbPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeLoadDriverPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeCreateGlobalPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeLockMemoryPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: 33 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeSecurityPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeTakeOwnershipPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeManageVolumePrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeBackupPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeCreatePagefilePrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeShutdownPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeRestorePrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: 33 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe Token: SeIncBasePriorityPrivilege 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5004 Aragami V1.03 Trainer +3 MrAntiFun.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1912 3708 Aragami V1.03 Trainer +3 MrAntiFun.exe 90 PID 3708 wrote to memory of 1912 3708 Aragami V1.03 Trainer +3 MrAntiFun.exe 90 PID 3708 wrote to memory of 1912 3708 Aragami V1.03 Trainer +3 MrAntiFun.exe 90 PID 1912 wrote to memory of 5004 1912 Aragami V1.03 Trainer +3 MrAntiFun.exe 91 PID 1912 wrote to memory of 5004 1912 Aragami V1.03 Trainer +3 MrAntiFun.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aragami V1.03 Trainer +3 MrAntiFun.exe"C:\Users\Admin\AppData\Local\Temp\Aragami V1.03 Trainer +3 MrAntiFun.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET62AD.tmp\Aragami V1.03 Trainer +3 MrAntiFun.exe"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET62AD.tmp\Aragami V1.03 Trainer +3 MrAntiFun.exe" -ORIGIN:"C:\Users\Admin\AppData\Local\Temp\"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET62AD.tmp\extracted\Aragami V1.03 Trainer +3 MrAntiFun.exe"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET62AD.tmp\extracted\Aragami V1.03 Trainer +3 MrAntiFun.exe" "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET62AD.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Users\Admin\AppData\Local\Temp\"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5004
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4392,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=3868 /prefetch:81⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD56852660b8cbb67ee3f1e31bf2f1e0afd
SHA1c1b790e062f3a13d3e2f90c58e92ded585abbe3b
SHA256cd86234cf14dfc0e66ae9e575326fd0cf74723a5a60337f7079c0540b6da5c8b
SHA5125722ebf6bef799721464094c6d6a81931bf8f78bdd1fbe12b153cf7b0e4e9e7307fa7a01e0cc16ce885c20c3a0a3cc95d6a7d86413f0c61cca3450fa565dd6a8
-
Filesize
4.1MB
MD5ef8633cf2edf9fbdccfa350edb01f6c9
SHA13397d7586b1aab1142e95c2a9515322306158243
SHA25698ba17af700a243c37ea977292c83e840df6f8f866ccf3ded8a0773ab51d76c5
SHA512a015093eb993bcd4b66282fee131c11b193590c7ae4366317943b20a34864423b8412a2e5466ef9b8069d9c448d57a7258cc2cdd7c6635023da35aa2f7451e73
-
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET62AD.tmp\extracted\Aragami V1.03 Trainer +3 MrAntiFun.exe
Filesize10.4MB
MD545996e41a50873d5dd6d37901ca3d4c5
SHA1c851ee71e40ba498d76fb4a94ea514c7889a00ff
SHA256a2558b4f3bb16ecc13fe69a697b24d72ee2e893f8b692c09e9b38720ddef7301
SHA512f2fd316593fb08ae22ea1b2c5ca4a8ad58034bb41e613363c8c2cb318a551f858ec9502c45f7f30398bef5e9fcdf48a3b90982dce5c22c0f71cf80b7ccc36ad5
-
Filesize
514KB
MD50ea4b6721965d0d5d713fef04f133fa6
SHA1298c071261b172d197a31cc8e5716ab7eb581f26
SHA2560a0f27c5ef625539e6e20b5dbcf10a64d2b329de91a542cd4491cffb07fdc9a4
SHA5129f727d94160632f0f40a3778ccc1a31e335789ba5abc876da80132eb22051477c23adf8c51f84841e5de747e227523f416260cf70f4ef21f483799a8eb93849a
-
Filesize
5KB
MD51dc41a0a351e745085fcc98a3933d91f
SHA1bf1e7d333e6d7b3d4bfe5cdcada19af1931dbe15
SHA256a2e02dd32f0245ff31190288b368b3efbbe7c48a95dd22c321231c2f46597d9b
SHA51276f171411d028e72613859332f381f8f26e85d1844c143a8888e4937ca72d7b38ffe66ce617eee5e8155ba034dcc559a9417b5def056bb74227b9bae392d1440
-
Filesize
500KB
MD5476cbd8e116ef838a0b161100ff744be
SHA172a6b00754ff4a1a6f2bbb75fbce9d2fdd475e81
SHA256c33f2e8ba61e5517b2598d7920b672326ff117ed5a5bdcddc125c6a5a328886e
SHA512b12dee6fdc493bdc7e65d446433d942802c79564f6a1f56a1c1a7e2e3f76d270af9e3d162d368fa82d314a37d98fef1569bf90f275b0e059ca0eca49c56086d8