Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
YoudaodbDictSetup.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
YoudaodbDictSetup.msi
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
telcgaem.exe
Resource
win7-20240903-en
General
-
Target
telcgaem.exe
-
Size
78.3MB
-
MD5
15c47c49822e2e151570f92f2c888810
-
SHA1
00bd79f05c1d2d6e1cd183b9091cfc49186d19db
-
SHA256
8b14e06f3d18713e80f1af4fba599c61c1afc60ae1188155fd1232dd2e912274
-
SHA512
ee20bd72a84482921e0ffa7321cafa5c80817ca26f5e74682b4d2bb9bc3043e36e05993db88c0b5634ac3db9933987f2b49127dd1e705a20d6786aa521936f5f
-
SSDEEP
1572864:NjsyFFS7s0bdNcqNdZStgE47uuJm3nB5ddE0OFS7s0bdNcqNdZvFS7s0bdNcqNdJ:HncsadOqNdstZ47uFbdRIcsadOqNd3cV
Malware Config
Signatures
-
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 4 IoCs
Processes:
Agghosts.exebin.exebin.tmpTelegram.exepid Process 2720 Agghosts.exe 2668 bin.exe 840 bin.tmp 2140 Telegram.exe -
Loads dropped DLL 11 IoCs
Processes:
Agghosts.exetelcgaem.exebin.exebin.tmpTelegram.exepid Process 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2548 telcgaem.exe 2668 bin.exe 840 bin.tmp 1188 1188 1188 1188 2140 Telegram.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
Telegram.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Telegram.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Agghosts.exedescription ioc Process File opened (read-only) \??\H: Agghosts.exe File opened (read-only) \??\Q: Agghosts.exe File opened (read-only) \??\G: Agghosts.exe File opened (read-only) \??\L: Agghosts.exe File opened (read-only) \??\U: Agghosts.exe File opened (read-only) \??\W: Agghosts.exe File opened (read-only) \??\X: Agghosts.exe File opened (read-only) \??\Z: Agghosts.exe File opened (read-only) \??\E: Agghosts.exe File opened (read-only) \??\I: Agghosts.exe File opened (read-only) \??\J: Agghosts.exe File opened (read-only) \??\N: Agghosts.exe File opened (read-only) \??\O: Agghosts.exe File opened (read-only) \??\S: Agghosts.exe File opened (read-only) \??\Y: Agghosts.exe File opened (read-only) \??\B: Agghosts.exe File opened (read-only) \??\K: Agghosts.exe File opened (read-only) \??\M: Agghosts.exe File opened (read-only) \??\P: Agghosts.exe File opened (read-only) \??\R: Agghosts.exe File opened (read-only) \??\T: Agghosts.exe File opened (read-only) \??\V: Agghosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
telcgaem.exeAgghosts.exeschtasks.exebin.execmd.exereg.exebin.tmpdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language telcgaem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agghosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin.tmp -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
Telegram.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe -
Modifies registry class 16 IoCs
Processes:
Telegram.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tdesktop.tg Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tdesktop.tg\shell Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tdesktop.tg\shell\open\command Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\DefaultIcon Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\shell\open Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\shell\open\command Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tdesktop.tg\DefaultIcon Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tdesktop.tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -- \"%1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\URL Protocol Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -- \"%1\"" Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tdesktop.tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tdesktop.tg\shell\open Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\ = "URL:Telegram Link" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\tg\shell Telegram.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Telegram.exepid Process 2140 Telegram.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
telcgaem.exeAgghosts.exebin.tmppid Process 2548 telcgaem.exe 2548 telcgaem.exe 2548 telcgaem.exe 2548 telcgaem.exe 2548 telcgaem.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 2720 Agghosts.exe 840 bin.tmp 840 bin.tmp -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
bin.tmpTelegram.exepid Process 840 bin.tmp 2140 Telegram.exe 2140 Telegram.exe 2140 Telegram.exe 2140 Telegram.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Telegram.exepid Process 2140 Telegram.exe 2140 Telegram.exe 2140 Telegram.exe 2140 Telegram.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
telcgaem.exeAgghosts.exepid Process 2548 telcgaem.exe 2720 Agghosts.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
telcgaem.execmd.exebin.exebin.tmpdescription pid Process procid_target PID 2548 wrote to memory of 1224 2548 telcgaem.exe 32 PID 2548 wrote to memory of 1224 2548 telcgaem.exe 32 PID 2548 wrote to memory of 1224 2548 telcgaem.exe 32 PID 2548 wrote to memory of 1224 2548 telcgaem.exe 32 PID 2548 wrote to memory of 2784 2548 telcgaem.exe 34 PID 2548 wrote to memory of 2784 2548 telcgaem.exe 34 PID 2548 wrote to memory of 2784 2548 telcgaem.exe 34 PID 2548 wrote to memory of 2784 2548 telcgaem.exe 34 PID 2548 wrote to memory of 2668 2548 telcgaem.exe 36 PID 2548 wrote to memory of 2668 2548 telcgaem.exe 36 PID 2548 wrote to memory of 2668 2548 telcgaem.exe 36 PID 2548 wrote to memory of 2668 2548 telcgaem.exe 36 PID 2548 wrote to memory of 2668 2548 telcgaem.exe 36 PID 2548 wrote to memory of 2668 2548 telcgaem.exe 36 PID 2548 wrote to memory of 2668 2548 telcgaem.exe 36 PID 2784 wrote to memory of 2684 2784 cmd.exe 37 PID 2784 wrote to memory of 2684 2784 cmd.exe 37 PID 2784 wrote to memory of 2684 2784 cmd.exe 37 PID 2784 wrote to memory of 2684 2784 cmd.exe 37 PID 2668 wrote to memory of 840 2668 bin.exe 38 PID 2668 wrote to memory of 840 2668 bin.exe 38 PID 2668 wrote to memory of 840 2668 bin.exe 38 PID 2668 wrote to memory of 840 2668 bin.exe 38 PID 2668 wrote to memory of 840 2668 bin.exe 38 PID 2668 wrote to memory of 840 2668 bin.exe 38 PID 2668 wrote to memory of 840 2668 bin.exe 38 PID 840 wrote to memory of 2140 840 bin.tmp 40 PID 840 wrote to memory of 2140 840 bin.tmp 40 PID 840 wrote to memory of 2140 840 bin.tmp 40 PID 840 wrote to memory of 2140 840 bin.tmp 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\telcgaem.exe"C:\Users\Admin\AppData\Local\Temp\telcgaem.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "pxChreefaupxokshorlt" /xml "C:\programdata\Mylnk\1.xml" /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1224
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\okshor\1.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Users\Public\Videos\bin.exeC:\Users\Public\Videos\bin.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\is-7EOLT.tmp\bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-7EOLT.tmp\bin.tmp" /SL5="$401CE,44109053,814592,C:\Users\Public\Videos\bin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2140
-
-
-
-
C:\okshor\Agghosts.exe"C:\okshor\Agghosts.exe" 671⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5169cb741dc0fb36dc6155f9326b44a0e
SHA1d5b42cd907e511f99e10218d7cf325eb890322b0
SHA256f7ef2dbc57831c73e9f84e8c14420cbd3678bd64b8899284611456340caceda6
SHA512f39eb6bc4624a3b383ad3891fc534cf10e389642da2d672aff87198b189ea37a59b5378bbce2f3f808cabb0ec6548b1f04085038c4fa4170fd07089e798021f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
4.7MB
MD562a89e7867d853fee9ad07b7c9d64379
SHA1944a53602492187308352103d80ff27af1093abf
SHA256d412909f1b597045b856caecedfc677eb4708af00e5b70788a01fa6af49c09d9
SHA5127f66bf278222bf1079a3695ad55086ccc7d8b05d7db4f9a5bcbfe4ac8d82bc1a618b1c6dc675da61d47f48fce2b0670ce6f66db63e79e232604304cfc629d6d0
-
Filesize
234B
MD556738d2f09890bc799257f6da9b9e09e
SHA1df75f0b67a684abb76671d3ed2da0578decfcaec
SHA2567a4ba5ea69112ce4df940b79557706d982e776e0a5ccd305d0d7bf85047c2a1b
SHA5122c787b47944f901b177fef9cbe167a50f3d95d2cd3a9f7ec4753e1af559e28427352078cdc49b6701dec28135e9b7e5aa26f2ecb79547b714d815b9d6a18fe92
-
Filesize
81KB
MD54748feb185e815e5564cd9c9573bfc94
SHA15e18754384528407d92fdf09656dca2860368423
SHA256cef00109676a75f21e2b682853f2fe0d18418edf08f73162b6cc43d7bbe70797
SHA5129a60a622a752742fceab645fc70d5e58818a7dd30bdb11424e58f68beccc54c7cdcdc7aec77b4811dda7c98a944e424e92f9a931ec36a3c8cf4898a19f4be732
-
Filesize
109KB
MD55c40dca67790f64aee9ddca96fa8b91f
SHA1a35fe072cac6fcc76adcbc2b5ac4b5e0f59388fa
SHA2567156d368e395a6a0620bd86f86bc6b93d829b5a90d7af62631d8b2c54a79da39
SHA51248a6a8db854c3ee88870791cf18005882ee2ab7d28ab565afc5e43cdf30cdb791e1ddb885cc398d99961651811fd27593940c39aa24cc66a46053bedba952069
-
Filesize
429KB
MD5cfbdf284c12056347e6773cb3949fbba
SHA1ad3fa5fbbc4296d4a901ea94460762faf3d6a2b8
SHA256bbecdfda2551b01aa16005c88305982c360a9fb9ba3d9be2fb15f2e9c6eb809f
SHA5122f24eac94d51f8f28c8e6b6234ca2e481e0f8f1a73df62766ff4f5640480377fb2c4a469babedb87d303503994b469e570aaf725e16da6f9b2d6a77f15b4623f
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530
-
Filesize
16KB
MD5f23db0b87538bde7fc0c9d7d8cc010fc
SHA1565b446b9dad1c57b4d962132d6253d4367a4e9e
SHA2568228573e8757a6a79c0bad985129706062048b4c97ae5ce8813c60570a406247
SHA512ffa3d8d305226fdf7daf6432c904f6f516d1d230b044bc7693c747b891aa17f1e76baae3400a061c36108f905aadaea2567934cc2182d5c8ae4700fc712ea435
-
Filesize
3KB
MD5368da51ea9910cacaac9822927dc84e5
SHA1b028a74de0e32e0397a2fb35502afec7f8e469c1
SHA256774301e5ca54aa6eee42af64edd71a7246cbe67342e48fb965187591f56219cb
SHA51280a8843888b65939f1e4238b58f8bee35ccc0302afc6dd0606c7e1f299933f767c9d4336b2b05f3556df0702cc51c65395fe41b9f0d7683eef6b15704249db99
-
Filesize
3.0MB
MD5fb01c7b8a3205457b6e92d2508a212f2
SHA13eb7e3cc688cd6bd87338297a1d8dae61ceddb69
SHA2568a91f3b900acfd24ebc403cfdb97cc36e5565e5d25544e521cd9705f5a900c8a
SHA51293deb0cf06e2d47eb20b5da6506078955199487319a7f173f0e5a510c7429e2bab2ab7df7bb591df5be58c393286c123218836eaa818b1e671f3ce349b25e6ce
-
Filesize
42.9MB
MD560e84a87393a855aea63cce2619ad0ff
SHA1dbbe89f1d8cb3e74b26b203a77643ddb4890296e
SHA25601e9a214a6c806120d4a6081687a1ec00e901a115eb3bbf8ee3101e4ce921bb4
SHA5123d99471020599a4e04da5dd818cb439af6c223ffa85d4932995a5d0088c7952d206d61f7f73e5be05593d82c5a286d5bd4d30ee130665ebb5ecd7f14694874da