Overview
overview
10Static
static
10aiosetup-main/Aio.bat
windows11-21h2-x64
10aiosetup-main/EXM.exe
windows11-21h2-x64
1aiosetup-m...on.cmd
windows11-21h2-x64
4aiosetup-main/aio.ps1
windows11-21h2-x64
10aiosetup-m...t2.exe
windows11-21h2-x64
7aiosetup-m...t3.exe
windows11-21h2-x64
7aiosetup-m...t4.exe
windows11-21h2-x64
6aiosetup-m...t5.exe
windows11-21h2-x64
7aiosetup-m...t6.exe
windows11-21h2-x64
7aiosetup-m...t7.msi
windows11-21h2-x64
6aiosetup-m...t8.exe
windows11-21h2-x64
7aiosetup-m...t9.exe
windows11-21h2-x64
7Resubmissions
17-11-2024 21:02
241117-zvfegaxpdv 1017-11-2024 20:51
241117-znh7saspgr 1017-11-2024 20:36
241117-zdt7assngr 10Analysis
-
max time kernel
444s -
max time network
452s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-11-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
aiosetup-main/Aio.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
aiosetup-main/EXM.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
aiosetup-main/HWID_Activation.cmd
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
aiosetup-main/aio.ps1
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
aiosetup-main/rdst2.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
aiosetup-main/rdst3.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
aiosetup-main/rdst4.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
aiosetup-main/rdst5.exe
Resource
win11-20241023-en
Behavioral task
behavioral9
Sample
aiosetup-main/rdst6.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
aiosetup-main/rdst7.msi
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
aiosetup-main/rdst8.exe
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
aiosetup-main/rdst9.exe
Resource
win11-20241007-en
General
-
Target
aiosetup-main/rdst3.exe
-
Size
14.3MB
-
MD5
f0248d477e74687c5619ae16498b13d4
-
SHA1
9ed4b091148c9b53f66b3f2c69be7e60e74c486a
-
SHA256
b6c82087a2c443db859fdbeaae7f46244d06c3f2a7f71c35e50358066253de52
-
SHA512
0c373b06ffe84f3e803831e90f22d7d73304e47a47839db614f63399ff1b7fcf33153bf3d23998877c96d2a75e316291a219fdd12358ca48928526284b802591
-
SSDEEP
393216:q5lptVYmfr7yBG/4WoI+j6LTinXKSf0fzTDv8:q7pttD7yBG/uljIinXj0fQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3712 rdst3.exe -
Loads dropped DLL 1 IoCs
pid Process 3712 rdst3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdst3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdst3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3712 3036 rdst3.exe 80 PID 3036 wrote to memory of 3712 3036 rdst3.exe 80 PID 3036 wrote to memory of 3712 3036 rdst3.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\aiosetup-main\rdst3.exe"C:\Users\Admin\AppData\Local\Temp\aiosetup-main\rdst3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Temp\{66CD38F4-9EFD-49E1-9E0C-E2838F1B86D1}\.cr\rdst3.exe"C:\Windows\Temp\{66CD38F4-9EFD-49E1-9E0C-E2838F1B86D1}\.cr\rdst3.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\aiosetup-main\rdst3.exe" -burn.filehandle.attached=560 -burn.filehandle.self=5562⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD5843288fd72a1152b50b4e4b7344bb592
SHA1648416c53721a85666abaf71c6682fcc1da70b48
SHA25682c3e3423e48bafcdd726624eb7fd3e00674e50e4b6acdcac408fe8fae43b022
SHA51204b61bb0a6e748ab78b1037db68bc9ec1745bb3efaca0b8fb6d99e01abbe08a67168cbf3f714b72daf00da26084ec6f6f707c3cd08fa8243023e6924719a4e41
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2