Analysis

  • max time kernel
    141s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 02:22

General

  • Target

    Aura Kasih.3gp.exe

  • Size

    1.6MB

  • MD5

    58488c76e6d0fd22564e21404013b5a5

  • SHA1

    99490d02a265fca0b0bc9e872ad97692b0d15180

  • SHA256

    381b23777603322ccaf6a8bfe5454f35aa6c8aba83b2d4a10a0f8634edeba592

  • SHA512

    81d74d9816be07cbc0d0e9b8429b112d53c79dd230764333cfdcb159d11475eb6f881c0862c6b76f3d8e379139f89c80343222f05e8ab990d3311a478ae58112

  • SSDEEP

    24576:3jqLBz+pKrlmMDRA7ELOh8iy0XYUlG2oBmyNE9PoH4xnJGmxW4fP2PgcBH:3GBiLMFAA+5X/zs+oTMW4fPu

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 43 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Aura Kasih.3gp.exe
    "C:\Users\Admin\AppData\Local\Temp\Aura Kasih.3gp.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\SysWOW64\28463\VLXX.exe
      "C:\Windows\system32\28463\VLXX.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1036
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Smu_Panas_Beredar (1).3gp"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Smu_Panas_Beredar (1).3gp

    Filesize

    746KB

    MD5

    ad31960a1842bb649b7734cb576dbbb9

    SHA1

    385a4a78106fec539459edf87939f1e59709ab61

    SHA256

    1cf0cae32ded2f55359fbb2a28a92bc65f5f31bc66a70e91afb1da16c6008bd8

    SHA512

    e5a000d9397a0f011095529eef1650594e16a5fdefc046e3e305078e11089992ecb8a747da5aa4c1bc98dd7e8be21bb18c000e924f8ff44a682a4de5dae4ab27

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    457KB

    MD5

    42e2202ac32edb39ccf9979515018d85

    SHA1

    c1e07fbe2fa759e2775d4dcf7de23a66d2422a1a

    SHA256

    367b4028baf3df4a5f77169bd64c9ef8fd7968a4d6c852ae3f81a726f4b37222

    SHA512

    a97d9e968b1f63dedba74999aabe6fd150aae985c1143d29b183cc0d663a45252c57494c3457136c5e500050c6af6c819f9ba7070b7d62300ede2e9a7c792768

  • C:\Windows\SysWOW64\28463\VLXX.001

    Filesize

    412B

    MD5

    30480670dbede82c3e9fa67f4e642fec

    SHA1

    5d46c5eb221c7dbcd14a650f77a5107e39534ee8

    SHA256

    b868b691ac97168080c24afbbeec5acf31f0c51c1a11277dccb34d86c24d85b1

    SHA512

    ae9383687e9094c4f0dede8c9cee134666cf7c85b881eb705087caa1dfb18be39ddcaa96129b7e1d521008f470a9cfe59dfa6135880ed39712c88a427064474d

  • C:\Windows\SysWOW64\28463\VLXX.006

    Filesize

    8KB

    MD5

    3da3041787b72a7909d9f6184ce6bc5e

    SHA1

    fc7f00b8a1341b5341e2ba6f94ba85364bc90843

    SHA256

    18e06896cc71e99b717cff8d68cba86fea3eba5087b93734f6418e53cadab5b3

    SHA512

    150fa3f8eeec3621ac61eab0da3f2692dd776887ec0c1791404df3dd8784982563496e1e990217a99c4fd53c5d5d68e0574737879b72d78ab737033f1b08560a

  • C:\Windows\SysWOW64\28463\VLXX.007

    Filesize

    5KB

    MD5

    50d0bcf6b5a6b11d9e274ccefba3f02e

    SHA1

    57acf2a1236b7534f2db661a9d95aeadcd41aa2a

    SHA256

    a5e5cf8b3133031f25db37fd13b029cdfc9d1588ca7f68041e52349f46cbbf5c

    SHA512

    c0288f92c75f4a6ea45434e3960a3c5d8ed3d890121a3fd6da2449e1313db523224e301451d85a15ea8ee9b5c2fb3bf294ee90869a4d5608bcf48fa94458e938

  • C:\Windows\SysWOW64\28463\key.bin

    Filesize

    105B

    MD5

    27c90d4d9b049f4cd00f32ed1d2e5baf

    SHA1

    338a3ea8f1e929d8916ece9b6e91e697eb562550

    SHA256

    172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb

    SHA512

    d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae

  • \Users\Admin\AppData\Local\Temp\@602A.tmp

    Filesize

    4KB

    MD5

    cb07753c45624238b4403480372be5db

    SHA1

    10af5bfbed599165d996470278f011728e866df7

    SHA256

    63c3ed8cbe11314a2f2cd6ff50305bad98075be9e09d22e45b47af557a3388e7

    SHA512

    2c72cca45ef924104c6892dd96f2e27a5d43bacc9f3eb0eeee24c871cc1bd1642d77734822d9d934f93a77c884fa1c682cf1ceddffe157a613978d9edd184312

  • \Windows\SysWOW64\28463\VLXX.exe

    Filesize

    647KB

    MD5

    a7b322839cedf8d56cb0a7dcdb50ab59

    SHA1

    d27855e65f5d9e87666f39d2af694a0d75330a75

    SHA256

    ba7362315c0608c9203c9d607fd85695fbc15f034ea40b3de7dd1abebd5859a3

    SHA512

    86a416ae639ca458e56093d5c04f3406ac0389cf9a1047f714424ba89ffd047ca58e6927bc941d285d4db9e8a95e91e0d578be3038a83945b6af90586ea9f649

  • memory/1036-17-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1036-22-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/1036-28-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/1036-27-0x0000000002240000-0x0000000002241000-memory.dmp

    Filesize

    4KB

  • memory/1036-26-0x0000000002280000-0x0000000002281000-memory.dmp

    Filesize

    4KB

  • memory/1036-25-0x00000000022C0000-0x00000000022C1000-memory.dmp

    Filesize

    4KB

  • memory/1036-24-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/1036-23-0x00000000022B0000-0x00000000022B1000-memory.dmp

    Filesize

    4KB

  • memory/1036-30-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1036-29-0x00000000030B0000-0x00000000030B2000-memory.dmp

    Filesize

    8KB

  • memory/1036-18-0x0000000001C70000-0x0000000001CCA000-memory.dmp

    Filesize

    360KB

  • memory/1036-33-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/1036-32-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1036-31-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1036-47-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1036-48-0x0000000001C70000-0x0000000001CCA000-memory.dmp

    Filesize

    360KB

  • memory/1036-49-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1232-16-0x0000000002A30000-0x0000000002B0F000-memory.dmp

    Filesize

    892KB

  • memory/2796-62-0x000007FEF53E0000-0x000007FEF55EB000-memory.dmp

    Filesize

    2.0MB

  • memory/2796-61-0x000007FEF55F0000-0x000007FEF66A0000-memory.dmp

    Filesize

    16.7MB

  • memory/2796-57-0x000007FEFB1B0000-0x000007FEFB1C7000-memory.dmp

    Filesize

    92KB

  • memory/2796-60-0x000007FEFB040000-0x000007FEFB051000-memory.dmp

    Filesize

    68KB

  • memory/2796-59-0x000007FEFB060000-0x000007FEFB07D000-memory.dmp

    Filesize

    116KB

  • memory/2796-58-0x000007FEFB080000-0x000007FEFB091000-memory.dmp

    Filesize

    68KB

  • memory/2796-53-0x000007FEF66A0000-0x000007FEF6956000-memory.dmp

    Filesize

    2.7MB

  • memory/2796-56-0x000007FEFB1D0000-0x000007FEFB1E1000-memory.dmp

    Filesize

    68KB

  • memory/2796-55-0x000007FEFB1F0000-0x000007FEFB207000-memory.dmp

    Filesize

    92KB

  • memory/2796-54-0x000007FEFBE70000-0x000007FEFBE88000-memory.dmp

    Filesize

    96KB

  • memory/2796-74-0x000007FEF7B00000-0x000007FEF7B7C000-memory.dmp

    Filesize

    496KB

  • memory/2796-73-0x000007FEFAA40000-0x000007FEFAAA7000-memory.dmp

    Filesize

    412KB

  • memory/2796-52-0x000007FEFB210000-0x000007FEFB244000-memory.dmp

    Filesize

    208KB

  • memory/2796-72-0x000007FEFAC60000-0x000007FEFAC90000-memory.dmp

    Filesize

    192KB

  • memory/2796-71-0x000007FEFAC90000-0x000007FEFACA8000-memory.dmp

    Filesize

    96KB

  • memory/2796-70-0x000007FEFACB0000-0x000007FEFACC1000-memory.dmp

    Filesize

    68KB

  • memory/2796-69-0x000007FEFACD0000-0x000007FEFACEB000-memory.dmp

    Filesize

    108KB

  • memory/2796-68-0x000007FEFACF0000-0x000007FEFAD01000-memory.dmp

    Filesize

    68KB

  • memory/2796-67-0x000007FEFAED0000-0x000007FEFAEE1000-memory.dmp

    Filesize

    68KB

  • memory/2796-66-0x000007FEFAEF0000-0x000007FEFAF01000-memory.dmp

    Filesize

    68KB

  • memory/2796-65-0x000007FEFAFA0000-0x000007FEFAFB8000-memory.dmp

    Filesize

    96KB

  • memory/2796-64-0x000007FEFAFC0000-0x000007FEFAFE1000-memory.dmp

    Filesize

    132KB

  • memory/2796-63-0x000007FEFAFF0000-0x000007FEFB031000-memory.dmp

    Filesize

    260KB

  • memory/2796-78-0x000007FEFAA00000-0x000007FEFAA17000-memory.dmp

    Filesize

    92KB

  • memory/2796-77-0x000007FEF5260000-0x000007FEF53E0000-memory.dmp

    Filesize

    1.5MB

  • memory/2796-76-0x000007FEF7AA0000-0x000007FEF7AF7000-memory.dmp

    Filesize

    348KB

  • memory/2796-75-0x000007FEFAA20000-0x000007FEFAA31000-memory.dmp

    Filesize

    68KB

  • memory/2796-51-0x000000013F560000-0x000000013F658000-memory.dmp

    Filesize

    992KB

  • memory/2796-84-0x000007FEF30E0000-0x000007FEF30F5000-memory.dmp

    Filesize

    84KB

  • memory/2796-83-0x000007FEF7900000-0x000007FEF794D000-memory.dmp

    Filesize

    308KB

  • memory/2796-82-0x000007FEF7950000-0x000007FEF7992000-memory.dmp

    Filesize

    264KB

  • memory/2796-81-0x000007FEF79A0000-0x000007FEF79B2000-memory.dmp

    Filesize

    72KB

  • memory/2796-80-0x000007FEF37E0000-0x000007FEF39E6000-memory.dmp

    Filesize

    2.0MB

  • memory/2796-101-0x000007FEF26B0000-0x000007FEF2724000-memory.dmp

    Filesize

    464KB

  • memory/2796-102-0x000007FEF2280000-0x000007FEF22B4000-memory.dmp

    Filesize

    208KB

  • memory/2796-79-0x000007FEF39F0000-0x000007FEF525F000-memory.dmp

    Filesize

    24.4MB

  • memory/2796-100-0x000007FEF2730000-0x000007FEF2777000-memory.dmp

    Filesize

    284KB

  • memory/2796-99-0x000007FEF2780000-0x000007FEF27E1000-memory.dmp

    Filesize

    388KB

  • memory/2796-98-0x000007FEF27F0000-0x000007FEF2801000-memory.dmp

    Filesize

    68KB

  • memory/2796-97-0x000007FEF2A00000-0x000007FEF2A13000-memory.dmp

    Filesize

    76KB

  • memory/2796-96-0x000007FEF2A20000-0x000007FEF2A32000-memory.dmp

    Filesize

    72KB

  • memory/2796-95-0x000007FEF2A40000-0x000007FEF2A5B000-memory.dmp

    Filesize

    108KB

  • memory/2796-85-0x000007FEF2E30000-0x000007FEF30E0000-memory.dmp

    Filesize

    2.7MB

  • memory/2796-94-0x000007FEF2A60000-0x000007FEF2BDA000-memory.dmp

    Filesize

    1.5MB

  • memory/2796-93-0x000007FEF2C00000-0x000007FEF2C13000-memory.dmp

    Filesize

    76KB

  • memory/2796-92-0x000007FEF2C20000-0x000007FEF2C4A000-memory.dmp

    Filesize

    168KB

  • memory/2796-91-0x000007FEF2C50000-0x000007FEF2C62000-memory.dmp

    Filesize

    72KB

  • memory/2796-90-0x000007FEF2C70000-0x000007FEF2C81000-memory.dmp

    Filesize

    68KB

  • memory/2796-89-0x000007FEF2CB0000-0x000007FEF2DB6000-memory.dmp

    Filesize

    1.0MB

  • memory/2796-88-0x000007FEF2DC0000-0x000007FEF2DD3000-memory.dmp

    Filesize

    76KB

  • memory/2796-87-0x000007FEF2DE0000-0x000007FEF2E03000-memory.dmp

    Filesize

    140KB

  • memory/2796-86-0x000007FEF2E10000-0x000007FEF2E25000-memory.dmp

    Filesize

    84KB

  • memory/2796-106-0x000007FEF66A0000-0x000007FEF6956000-memory.dmp

    Filesize

    2.7MB