Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 14:02
Behavioral task
behavioral1
Sample
agg.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
agg.exe
Resource
win10v2004-20250207-en
General
-
Target
agg.exe
-
Size
543KB
-
MD5
4dbf422d243020b7c8dbf7f186e9f405
-
SHA1
4e2e3ee0214f1d20817efc248d10faea235cc4b5
-
SHA256
9f0a14be6b3437eb09cca475a3fdcc22bfe51af31abeed95c57be0f61fbffd35
-
SHA512
8b903fae347f8b4576720307b03abfcb2b19ff00a6c29cb2199d911531bc90dff1d438449072d64ab8bd75fa735f05953e95dc04455139e9e4622249ee4f57b9
-
SSDEEP
12288:HLV6BtpmkUliOEyfOR4BLij8f4McGz0esfr:rApfUIOEyfjA8AMeesfr
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DSL Manager = "C:\\Program Files\\DSL Manager\\dslmgr.exe" agg.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA agg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\DSL Manager\dslmgr.exe agg.exe File opened for modification C:\Program Files\DSL Manager\dslmgr.exe agg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2404 schtasks.exe 1324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1196 agg.exe 1196 agg.exe 1196 agg.exe 1196 agg.exe 1196 agg.exe 1196 agg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 agg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1196 agg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1324 1196 agg.exe 30 PID 1196 wrote to memory of 1324 1196 agg.exe 30 PID 1196 wrote to memory of 1324 1196 agg.exe 30 PID 1196 wrote to memory of 2404 1196 agg.exe 32 PID 1196 wrote to memory of 2404 1196 agg.exe 32 PID 1196 wrote to memory of 2404 1196 agg.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\agg.exe"C:\Users\Admin\AppData\Local\Temp\agg.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\schtasks.exe"schtasks.exe" /create /f /tn "DSL Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA795.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1324
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /create /f /tn "DSL Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA861.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6157234b2b6ca8f8d1e697731927364
SHA1a245df0c0de55ee1aa7c167f2884bbb0b9f479c8
SHA2560061aab09024753d113b25378f07345ef3b1c4b17db4bb1dcb0a9420486d01e5
SHA5128c97b01c425a76d7865960febc04ee5196f34d71693f91e75b26bfdfa444ce45e5e1a22f4922894cc0087f1aa68cc6de9c4cd5edfa7454c48c5712b73e8403ad
-
Filesize
1KB
MD510ae1ba70a0bb6d3ca9aa43f610f1656
SHA105add06d0b4a21408f659d233919a7f5fdf5b639
SHA256521664ecbbcfce4ec86a0d48bea0614d4207ccef37680770657dc8ff593ae0cc
SHA5123b571ff4ae7ee3448a506dfe793e91dfcef5c830a66a54e59e648111da889bef2aebe563354eec1f267e976eca73c024f314500f21597ff2e80f82db5220a00d