Overview
overview
10Static
static
10aiosetup-main/Aio.bat
windows11-21h2-x64
10aiosetup-main/EXM.exe
windows11-21h2-x64
1aiosetup-m...on.cmd
windows11-21h2-x64
4aiosetup-main/aio.ps1
windows11-21h2-x64
10aiosetup-m...t2.exe
windows11-21h2-x64
7aiosetup-m...t3.exe
windows11-21h2-x64
7aiosetup-m...t4.exe
windows11-21h2-x64
6aiosetup-m...t5.exe
windows11-21h2-x64
7aiosetup-m...t6.exe
windows11-21h2-x64
7aiosetup-m...t7.msi
windows11-21h2-x64
6aiosetup-m...t8.exe
windows11-21h2-x64
7aiosetup-m...t9.exe
windows11-21h2-x64
7Resubmissions
17-11-2024 21:02
241117-zvfegaxpdv 1017-11-2024 20:51
241117-znh7saspgr 1017-11-2024 20:36
241117-zdt7assngr 10Analysis
-
max time kernel
91s -
max time network
205s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-11-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
aiosetup-main/Aio.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
aiosetup-main/EXM.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
aiosetup-main/HWID_Activation.cmd
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
aiosetup-main/aio.ps1
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
aiosetup-main/rdst2.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
aiosetup-main/rdst3.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
aiosetup-main/rdst4.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
aiosetup-main/rdst5.exe
Resource
win11-20241023-en
Behavioral task
behavioral9
Sample
aiosetup-main/rdst6.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
aiosetup-main/rdst7.msi
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
aiosetup-main/rdst8.exe
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
aiosetup-main/rdst9.exe
Resource
win11-20241007-en
General
-
Target
aiosetup-main/rdst4.exe
-
Size
790KB
-
MD5
694f54bd227916b89fc3eb1db53f0685
-
SHA1
21fdc367291bbef14dac27925cae698d3928eead
-
SHA256
b8f39714d41e009f75efb183c37100f2cbabb71784bbd243be881ac5b42d86fd
-
SHA512
55bc0de75a7f27f11eb8f4ee8c9934dfe1acd044d8b7b2151c506bdcbead3ab179df7023f699c9139c77541bbc4b1c0657e93c34a6bc4309b665c6cb7636a7e5
-
SSDEEP
12288:0s1yfEcpPzdv+t4cRIy3ze3SUN0PXGTjiqRy2p3kwzjGHTkV:NwfLrvi4cRIyDe3SUNaXy+WypoGHgV
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tmpA54A.tmp rdst4.exe File opened for modification C:\Windows\SysWOW64\tmpA54B.tmp rdst4.exe File opened for modification C:\Windows\SysWOW64\tmp8D0D.tmp rdst4.exe File opened for modification C:\Windows\SysWOW64\tmp8D1E.tmp rdst4.exe File created C:\Windows\SysWOW64\OpenAL32.new rdst4.exe File created C:\Windows\SysWOW64\wrap_oal.new rdst4.exe File created C:\Windows\system32\OpenAL32.new rdst4.exe File created C:\Windows\system32\wrap_oal.new rdst4.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\OpenAL\rdst4.exe rdst4.exe File opened for modification C:\Program Files (x86)\OpenAL\rdst4.exe rdst4.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdst4.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5235355a8dd26903e75d5e812ecf50e53
SHA18316319341a0f9054e19e4a7b21df3dc49386fee
SHA2561797d150a2e23af4f390f5c33eb598c6f58d0454011d74941f5316add900bbdd
SHA5125beb9343028790f993d0acb1007fd112b7e2ef6f9fbedfdb62b0140d2bbadf3b6368417ea19edb0bc8674d19418e5784fef4430ce1c329de8e83c304706d39ac
-
Filesize
790KB
MD5694f54bd227916b89fc3eb1db53f0685
SHA121fdc367291bbef14dac27925cae698d3928eead
SHA256b8f39714d41e009f75efb183c37100f2cbabb71784bbd243be881ac5b42d86fd
SHA51255bc0de75a7f27f11eb8f4ee8c9934dfe1acd044d8b7b2151c506bdcbead3ab179df7023f699c9139c77541bbc4b1c0657e93c34a6bc4309b665c6cb7636a7e5
-
Filesize
434KB
MD5d494267bc169604fac5e3679b9a97fed
SHA1c093ce5a4f7dc40f7f604945bd1facfb2c805c4b
SHA256a4e46e6d09c4b0966824a2f6628ebf738e813672692a52a0d63d982e1030ef4f
SHA5127cfcfb570ecfa974054b5285c7d6ad3bccf502866ea70789750c3748394cb0991d1fa6dec9c50a506dbc697953663ec2605277a4451098bb8cd6699c4e506040
-
Filesize
120KB
MD52ad7b4f3c8d2bb686d231edff404b7a4
SHA1f29676b96d04bd2765925a3834d9babfdce6a0b3
SHA25687802322c8e63555c26fe473ce234ce7099745ccb28c02766c2224c726454039
SHA51251a6c8cfe30e34c37437e6c5f8c602aa0759b65559a82521e2dbcf8a9865b826077854acb6497df6085d67b4c66083ae5f0f192b743a4b6f77ce7b18f01bf528
-
Filesize
455KB
MD5549347bcd4aacd63243d78e8f869dbb1
SHA1efc00d2a7c5acfe17b8a58023826e6840aef39a6
SHA2565379373cf3eff41cdd8c912c65e27e1bd492bd84238d19a093aa846c9b1ce909
SHA512c6789376d05deb8c5050225c37c023055c107a72b49afddfd3f91e7e7429d38db9346e2e5d38986c2000c3828389cfbe5d74d80423a79eebd0367bcc81137cd5