Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
YoudaodbDictSetup.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
YoudaodbDictSetup.msi
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
telcgaem.exe
Resource
win7-20240903-en
General
-
Target
telcgaem.exe
-
Size
78.3MB
-
MD5
15c47c49822e2e151570f92f2c888810
-
SHA1
00bd79f05c1d2d6e1cd183b9091cfc49186d19db
-
SHA256
8b14e06f3d18713e80f1af4fba599c61c1afc60ae1188155fd1232dd2e912274
-
SHA512
ee20bd72a84482921e0ffa7321cafa5c80817ca26f5e74682b4d2bb9bc3043e36e05993db88c0b5634ac3db9933987f2b49127dd1e705a20d6786aa521936f5f
-
SSDEEP
1572864:NjsyFFS7s0bdNcqNdZStgE47uuJm3nB5ddE0OFS7s0bdNcqNdZvFS7s0bdNcqNdJ:HncsadOqNdstZ47uFbdRIcsadOqNd3cV
Malware Config
Signatures
-
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
telcgaem.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation telcgaem.exe -
Executes dropped EXE 4 IoCs
Processes:
Agghosts.exebin.exebin.tmpTelegram.exepid Process 3340 Agghosts.exe 4484 bin.exe 4964 bin.tmp 1880 Telegram.exe -
Loads dropped DLL 4 IoCs
Processes:
Agghosts.exeTelegram.exepid Process 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 1880 Telegram.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
Telegram.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Telegram.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Agghosts.exedescription ioc Process File opened (read-only) \??\R: Agghosts.exe File opened (read-only) \??\S: Agghosts.exe File opened (read-only) \??\W: Agghosts.exe File opened (read-only) \??\X: Agghosts.exe File opened (read-only) \??\B: Agghosts.exe File opened (read-only) \??\H: Agghosts.exe File opened (read-only) \??\K: Agghosts.exe File opened (read-only) \??\L: Agghosts.exe File opened (read-only) \??\N: Agghosts.exe File opened (read-only) \??\O: Agghosts.exe File opened (read-only) \??\Q: Agghosts.exe File opened (read-only) \??\Z: Agghosts.exe File opened (read-only) \??\G: Agghosts.exe File opened (read-only) \??\J: Agghosts.exe File opened (read-only) \??\M: Agghosts.exe File opened (read-only) \??\P: Agghosts.exe File opened (read-only) \??\T: Agghosts.exe File opened (read-only) \??\U: Agghosts.exe File opened (read-only) \??\Y: Agghosts.exe File opened (read-only) \??\E: Agghosts.exe File opened (read-only) \??\I: Agghosts.exe File opened (read-only) \??\V: Agghosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
telcgaem.exeAgghosts.exeschtasks.execmd.exereg.exebin.exebin.tmpdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language telcgaem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agghosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin.tmp -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
Telegram.exedescription ioc Process Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe -
Modifies registry class 17 IoCs
Processes:
Telegram.exetelcgaem.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tdesktop.tg\DefaultIcon Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tdesktop.tg\shell\open\command Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\DefaultIcon Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ telcgaem.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tdesktop.tg\shell\open Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\ = "URL:Telegram Link" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\shell\open\command Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tdesktop.tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tdesktop.tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tdesktop.tg\shell Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tdesktop.tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -- \"%1\"" Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\URL Protocol Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\shell Telegram.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\shell\open Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -- \"%1\"" Telegram.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Telegram.exepid Process 1880 Telegram.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
telcgaem.exeAgghosts.exepid Process 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 1092 telcgaem.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe 3340 Agghosts.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
bin.tmpTelegram.exepid Process 4964 bin.tmp 1880 Telegram.exe 1880 Telegram.exe 1880 Telegram.exe 1880 Telegram.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Telegram.exepid Process 1880 Telegram.exe 1880 Telegram.exe 1880 Telegram.exe 1880 Telegram.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
telcgaem.exeAgghosts.exeTelegram.exepid Process 1092 telcgaem.exe 3340 Agghosts.exe 1880 Telegram.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
telcgaem.execmd.exebin.exebin.tmpdescription pid Process procid_target PID 1092 wrote to memory of 1616 1092 telcgaem.exe 92 PID 1092 wrote to memory of 1616 1092 telcgaem.exe 92 PID 1092 wrote to memory of 1616 1092 telcgaem.exe 92 PID 1092 wrote to memory of 1496 1092 telcgaem.exe 94 PID 1092 wrote to memory of 1496 1092 telcgaem.exe 94 PID 1092 wrote to memory of 1496 1092 telcgaem.exe 94 PID 1496 wrote to memory of 4772 1496 cmd.exe 97 PID 1496 wrote to memory of 4772 1496 cmd.exe 97 PID 1496 wrote to memory of 4772 1496 cmd.exe 97 PID 1092 wrote to memory of 4484 1092 telcgaem.exe 95 PID 1092 wrote to memory of 4484 1092 telcgaem.exe 95 PID 1092 wrote to memory of 4484 1092 telcgaem.exe 95 PID 4484 wrote to memory of 4964 4484 bin.exe 98 PID 4484 wrote to memory of 4964 4484 bin.exe 98 PID 4484 wrote to memory of 4964 4484 bin.exe 98 PID 4964 wrote to memory of 1880 4964 bin.tmp 105 PID 4964 wrote to memory of 1880 4964 bin.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\telcgaem.exe"C:\Users\Admin\AppData\Local\Temp\telcgaem.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "xiChremfauxirumkcplt" /xml "C:\programdata\Mylnk\1.xml" /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rumkcp\1.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\Users\Public\Videos\bin.exeC:\Users\Public\Videos\bin.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\is-K2D6T.tmp\bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-K2D6T.tmp\bin.tmp" /SL5="$150066,44109053,814592,C:\Users\Public\Videos\bin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
-
-
C:\rumkcp\Agghosts.exe"C:\rumkcp\Agghosts.exe" 671⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3340
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59318548681b9f42e5a0be29e08d13ed4
SHA11870b52502593799966ce2e09dd2564ca24b9046
SHA2566ba1de45a6013ae936eea63b6e2daede3287c389d36d2c7c5f6d0daceb38d436
SHA5128f7771c2a369fa2f529f1c1ee0a6f1df61e9a2b36b5ce13f1f0d487855747676ca013eaf117d97a1af8bac4a0277deba7eb31ec0576d12feb8d7792fc630b429
-
Filesize
3.0MB
MD5fb01c7b8a3205457b6e92d2508a212f2
SHA13eb7e3cc688cd6bd87338297a1d8dae61ceddb69
SHA2568a91f3b900acfd24ebc403cfdb97cc36e5565e5d25544e521cd9705f5a900c8a
SHA51293deb0cf06e2d47eb20b5da6506078955199487319a7f173f0e5a510c7429e2bab2ab7df7bb591df5be58c393286c123218836eaa818b1e671f3ce349b25e6ce
-
Filesize
4.7MB
MD562a89e7867d853fee9ad07b7c9d64379
SHA1944a53602492187308352103d80ff27af1093abf
SHA256d412909f1b597045b856caecedfc677eb4708af00e5b70788a01fa6af49c09d9
SHA5127f66bf278222bf1079a3695ad55086ccc7d8b05d7db4f9a5bcbfe4ac8d82bc1a618b1c6dc675da61d47f48fce2b0670ce6f66db63e79e232604304cfc629d6d0
-
Filesize
42.9MB
MD560e84a87393a855aea63cce2619ad0ff
SHA1dbbe89f1d8cb3e74b26b203a77643ddb4890296e
SHA25601e9a214a6c806120d4a6081687a1ec00e901a115eb3bbf8ee3101e4ce921bb4
SHA5123d99471020599a4e04da5dd818cb439af6c223ffa85d4932995a5d0088c7952d206d61f7f73e5be05593d82c5a286d5bd4d30ee130665ebb5ecd7f14694874da
-
Filesize
3KB
MD59eaf39ff9b0149d4cb9eee9621d2172a
SHA103f98d166f7464b8fbe50699fd1e5e91a2228d0c
SHA256de321631188389a11ed4b30266e8285287e57224171593db61fc8993bba1bcb1
SHA512f78be57c6674d786cd543859df01475750a22c00d5876e8eb12ae122c9fad0ebc55a53807c07a7aee739708c212aea87f608f98e98941de9cb654a56f9e60eba
-
Filesize
234B
MD556738d2f09890bc799257f6da9b9e09e
SHA1df75f0b67a684abb76671d3ed2da0578decfcaec
SHA2567a4ba5ea69112ce4df940b79557706d982e776e0a5ccd305d0d7bf85047c2a1b
SHA5122c787b47944f901b177fef9cbe167a50f3d95d2cd3a9f7ec4753e1af559e28427352078cdc49b6701dec28135e9b7e5aa26f2ecb79547b714d815b9d6a18fe92
-
Filesize
81KB
MD54748feb185e815e5564cd9c9573bfc94
SHA15e18754384528407d92fdf09656dca2860368423
SHA256cef00109676a75f21e2b682853f2fe0d18418edf08f73162b6cc43d7bbe70797
SHA5129a60a622a752742fceab645fc70d5e58818a7dd30bdb11424e58f68beccc54c7cdcdc7aec77b4811dda7c98a944e424e92f9a931ec36a3c8cf4898a19f4be732
-
Filesize
109KB
MD55c40dca67790f64aee9ddca96fa8b91f
SHA1a35fe072cac6fcc76adcbc2b5ac4b5e0f59388fa
SHA2567156d368e395a6a0620bd86f86bc6b93d829b5a90d7af62631d8b2c54a79da39
SHA51248a6a8db854c3ee88870791cf18005882ee2ab7d28ab565afc5e43cdf30cdb791e1ddb885cc398d99961651811fd27593940c39aa24cc66a46053bedba952069
-
Filesize
429KB
MD5cfbdf284c12056347e6773cb3949fbba
SHA1ad3fa5fbbc4296d4a901ea94460762faf3d6a2b8
SHA256bbecdfda2551b01aa16005c88305982c360a9fb9ba3d9be2fb15f2e9c6eb809f
SHA5122f24eac94d51f8f28c8e6b6234ca2e481e0f8f1a73df62766ff4f5640480377fb2c4a469babedb87d303503994b469e570aaf725e16da6f9b2d6a77f15b4623f
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530
-
Filesize
16KB
MD5f23db0b87538bde7fc0c9d7d8cc010fc
SHA1565b446b9dad1c57b4d962132d6253d4367a4e9e
SHA2568228573e8757a6a79c0bad985129706062048b4c97ae5ce8813c60570a406247
SHA512ffa3d8d305226fdf7daf6432c904f6f516d1d230b044bc7693c747b891aa17f1e76baae3400a061c36108f905aadaea2567934cc2182d5c8ae4700fc712ea435