Analysis
-
max time kernel
58s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:42
Behavioral task
behavioral1
Sample
4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe
Resource
win7-20240903-en
General
-
Target
4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe
-
Size
413KB
-
MD5
e451b5df605f0d8c71aabdcd14c2d740
-
SHA1
5a44a48c536377ef6b311c31dc42170b2c7e2277
-
SHA256
4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4d
-
SHA512
403efb9868f7c977182e47f5feddb33f13c3eb22e1147387d94b5410ca1ea39109dddf6efd1438f10cbc9dab45333ce9b497b048e4e072bbb07bb98693fea5e9
-
SSDEEP
12288:Ax0L1e1+sztEFXdewVNNiHGuEUL7Jfa7nIC:Ax0L1qEPeWrNg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 Amugoa.exe -
resource yara_rule behavioral1/memory/1860-0-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1860-9-0x0000000002140000-0x00000000021A9000-memory.dmp upx behavioral1/files/0x000800000001748f-13.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\H3O8CABBPI = "C:\\Windows\\Amugoa.exe" Amugoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Amugoa.exe 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe File opened for modification C:\Windows\Amugoa.exe 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amugoa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main Amugoa.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe 2348 Amugoa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2348 Amugoa.exe 1860 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1860 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe 2348 Amugoa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2348 1860 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe 30 PID 1860 wrote to memory of 2348 1860 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe 30 PID 1860 wrote to memory of 2348 1860 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe 30 PID 1860 wrote to memory of 2348 1860 4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe"C:\Users\Admin\AppData\Local\Temp\4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\Amugoa.exeC:\Windows\Amugoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD5e451b5df605f0d8c71aabdcd14c2d740
SHA15a44a48c536377ef6b311c31dc42170b2c7e2277
SHA2564ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4d
SHA512403efb9868f7c977182e47f5feddb33f13c3eb22e1147387d94b5410ca1ea39109dddf6efd1438f10cbc9dab45333ce9b497b048e4e072bbb07bb98693fea5e9
-
Filesize
410B
MD505de07bc11ac6a6b798838190190e16a
SHA160b3f8f68fd5897719ce6285aae0b769ffec0474
SHA256bdefc8aa490ff23f73a6101e4636be80a0d88df17ae8e451f188aedaa25a4b2b
SHA5128e56cf719e34994d710740489024cbd2b9b1116bdc4d7dcddfc200b041959ab946875d7514b4c9ae8f9d48084732a5682cddaba61514fd1df9176beb48444083