Analysis
-
max time kernel
141s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
Aura Kasih.3gp.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Aura Kasih.3gp.exe
Resource
win10v2004-20240802-en
General
-
Target
Aura Kasih.3gp.exe
-
Size
1.6MB
-
MD5
58488c76e6d0fd22564e21404013b5a5
-
SHA1
99490d02a265fca0b0bc9e872ad97692b0d15180
-
SHA256
381b23777603322ccaf6a8bfe5454f35aa6c8aba83b2d4a10a0f8634edeba592
-
SHA512
81d74d9816be07cbc0d0e9b8429b112d53c79dd230764333cfdcb159d11475eb6f881c0862c6b76f3d8e379139f89c80343222f05e8ab990d3311a478ae58112
-
SSDEEP
24576:3jqLBz+pKrlmMDRA7ELOh8iy0XYUlG2oBmyNE9PoH4xnJGmxW4fP2PgcBH:3GBiLMFAA+5X/zs+oTMW4fPu
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000019240-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 1036 VLXX.exe -
Loads dropped DLL 4 IoCs
pid Process 1232 Aura Kasih.3gp.exe 1232 Aura Kasih.3gp.exe 1036 VLXX.exe 1036 VLXX.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VLXX Agent = "C:\\Windows\\SysWOW64\\28463\\VLXX.exe" VLXX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\VLXX.007 Aura Kasih.3gp.exe File created C:\Windows\SysWOW64\28463\VLXX.exe Aura Kasih.3gp.exe File created C:\Windows\SysWOW64\28463\key.bin Aura Kasih.3gp.exe File created C:\Windows\SysWOW64\28463\AKV.exe Aura Kasih.3gp.exe File opened for modification C:\Windows\SysWOW64\28463 VLXX.exe File created C:\Windows\SysWOW64\28463\VLXX.001 Aura Kasih.3gp.exe File created C:\Windows\SysWOW64\28463\VLXX.006 Aura Kasih.3gp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura Kasih.3gp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VLXX.exe -
Modifies registry class 43 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\0\ VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\0\win32 VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\ = "Hetavdor.Dahac.Lenebisa object" VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0 VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\Version\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\Version\ = "1.0" VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\VersionIndependentProgID\ = "MsTscAx.MsTscAx" VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\Programmable\ VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B} VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\FLAGS\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\Programmable VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\ToolboxBitmap32\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\InprocServer32\ = "%systemroot%\\SysWow64\\mstscax.dll" VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\MiscStatus VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\ProgID VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\ProgID\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\ = "GrooveSystemServicesAlpha" VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\0 VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC} VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\InprocServer32 VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\27" VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\TypeLib\ = "{A937F968-2B9B-941A-E137-42E016E5175B}" VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\0\win32\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\HELPDIR\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\ProgID\ = "MsTscAx.MsTscAx.3" VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\VersionIndependentProgID\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\MiscStatus\ = "0" VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\TypeLib\ VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\VersionIndependentProgID VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\Control VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\Control\ VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\ToolboxBitmap32 VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\ToolboxBitmap32\ = "%systemroot%\\SysWow64\\mstscax.dll" VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\FLAGS VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\FLAGS\ = "4" VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A937F968-2B9B-941A-E137-42E016E5175B}\1.0\HELPDIR VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\TypeLib VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\InprocServer32\ VLXX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\MiscStatus\ VLXX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18275427-E4E1-4303-769A-9E7C924ADFAC}\Version VLXX.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2796 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1036 VLXX.exe Token: SeIncBasePriorityPrivilege 1036 VLXX.exe Token: 33 2796 vlc.exe Token: SeIncBasePriorityPrivilege 2796 vlc.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe 2796 vlc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1036 VLXX.exe 1036 VLXX.exe 1036 VLXX.exe 1036 VLXX.exe 1036 VLXX.exe 2796 vlc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1036 1232 Aura Kasih.3gp.exe 30 PID 1232 wrote to memory of 1036 1232 Aura Kasih.3gp.exe 30 PID 1232 wrote to memory of 1036 1232 Aura Kasih.3gp.exe 30 PID 1232 wrote to memory of 1036 1232 Aura Kasih.3gp.exe 30 PID 1232 wrote to memory of 2796 1232 Aura Kasih.3gp.exe 31 PID 1232 wrote to memory of 2796 1232 Aura Kasih.3gp.exe 31 PID 1232 wrote to memory of 2796 1232 Aura Kasih.3gp.exe 31 PID 1232 wrote to memory of 2796 1232 Aura Kasih.3gp.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aura Kasih.3gp.exe"C:\Users\Admin\AppData\Local\Temp\Aura Kasih.3gp.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\28463\VLXX.exe"C:\Windows\system32\28463\VLXX.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Smu_Panas_Beredar (1).3gp"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
746KB
MD5ad31960a1842bb649b7734cb576dbbb9
SHA1385a4a78106fec539459edf87939f1e59709ab61
SHA2561cf0cae32ded2f55359fbb2a28a92bc65f5f31bc66a70e91afb1da16c6008bd8
SHA512e5a000d9397a0f011095529eef1650594e16a5fdefc046e3e305078e11089992ecb8a747da5aa4c1bc98dd7e8be21bb18c000e924f8ff44a682a4de5dae4ab27
-
Filesize
457KB
MD542e2202ac32edb39ccf9979515018d85
SHA1c1e07fbe2fa759e2775d4dcf7de23a66d2422a1a
SHA256367b4028baf3df4a5f77169bd64c9ef8fd7968a4d6c852ae3f81a726f4b37222
SHA512a97d9e968b1f63dedba74999aabe6fd150aae985c1143d29b183cc0d663a45252c57494c3457136c5e500050c6af6c819f9ba7070b7d62300ede2e9a7c792768
-
Filesize
412B
MD530480670dbede82c3e9fa67f4e642fec
SHA15d46c5eb221c7dbcd14a650f77a5107e39534ee8
SHA256b868b691ac97168080c24afbbeec5acf31f0c51c1a11277dccb34d86c24d85b1
SHA512ae9383687e9094c4f0dede8c9cee134666cf7c85b881eb705087caa1dfb18be39ddcaa96129b7e1d521008f470a9cfe59dfa6135880ed39712c88a427064474d
-
Filesize
8KB
MD53da3041787b72a7909d9f6184ce6bc5e
SHA1fc7f00b8a1341b5341e2ba6f94ba85364bc90843
SHA25618e06896cc71e99b717cff8d68cba86fea3eba5087b93734f6418e53cadab5b3
SHA512150fa3f8eeec3621ac61eab0da3f2692dd776887ec0c1791404df3dd8784982563496e1e990217a99c4fd53c5d5d68e0574737879b72d78ab737033f1b08560a
-
Filesize
5KB
MD550d0bcf6b5a6b11d9e274ccefba3f02e
SHA157acf2a1236b7534f2db661a9d95aeadcd41aa2a
SHA256a5e5cf8b3133031f25db37fd13b029cdfc9d1588ca7f68041e52349f46cbbf5c
SHA512c0288f92c75f4a6ea45434e3960a3c5d8ed3d890121a3fd6da2449e1313db523224e301451d85a15ea8ee9b5c2fb3bf294ee90869a4d5608bcf48fa94458e938
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae
-
Filesize
4KB
MD5cb07753c45624238b4403480372be5db
SHA110af5bfbed599165d996470278f011728e866df7
SHA25663c3ed8cbe11314a2f2cd6ff50305bad98075be9e09d22e45b47af557a3388e7
SHA5122c72cca45ef924104c6892dd96f2e27a5d43bacc9f3eb0eeee24c871cc1bd1642d77734822d9d934f93a77c884fa1c682cf1ceddffe157a613978d9edd184312
-
Filesize
647KB
MD5a7b322839cedf8d56cb0a7dcdb50ab59
SHA1d27855e65f5d9e87666f39d2af694a0d75330a75
SHA256ba7362315c0608c9203c9d607fd85695fbc15f034ea40b3de7dd1abebd5859a3
SHA51286a416ae639ca458e56093d5c04f3406ac0389cf9a1047f714424ba89ffd047ca58e6927bc941d285d4db9e8a95e91e0d578be3038a83945b6af90586ea9f649