Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 09:18
Behavioral task
behavioral1
Sample
AGCG.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
AGCG.exe
Resource
win10v2004-20240611-en
General
-
Target
AGCG.exe
-
Size
10.4MB
-
MD5
31322c4e4fcf9d56621479b4a4b8930a
-
SHA1
b38551e9b1932295006533b80b302fbb013275d6
-
SHA256
aead7d3c1ffce1571a497646c0a9b844886dc538d731535648fb25c4bd949bdb
-
SHA512
2595a6830a1998a9f429d03ce706c2e561385b56d4b4bcdc43fba1ef32f6d507c6aecb93202806a02b9c9293f4ad5da35081e62510a36e312e1e3da5c86e4e6a
-
SSDEEP
196608:YeBImcz64f4XzkneX38DXDQ9cGjtbYPvbJQlHHO2Sv3cIy88CN57Jmk9D2Izqh:amcz64Ay0MDTQ99jkJQlnhIlIqlO
Malware Config
Signatures
-
Loads dropped DLL 17 IoCs
Processes:
AGCG.exepid process 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe 4976 AGCG.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
AGCG.exedescription pid process target process PID 2984 wrote to memory of 4976 2984 AGCG.exe AGCG.exe PID 2984 wrote to memory of 4976 2984 AGCG.exe AGCG.exe PID 2984 wrote to memory of 4976 2984 AGCG.exe AGCG.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\VCRUNTIME140.dllFilesize
81KB
MD54c360f78de1f5baaa5f110e65fac94b4
SHA120a2e66fd577293b33ba1c9d01ef04582deaf3a5
SHA256ad1b0992b890bfe88ef52d0a830873acc0aecc9bd6e4fc22397dbccf4d2b4e37
SHA512c6bba093d2e83b178a783d1ddfd1530c3adcb623d299d56db1b94ed34c0447e88930200bf45e5fb961f8fd7ad691310b586a7d754d7a6d7d27d58b74986a4db8
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_bz2.pydFilesize
76KB
MD50f75c236c4ccfea1b16f132f6c139236
SHA1710bb157b01cafe8607400773b3940674506013b
SHA2565dc26dcbf58cc7f5bfdec0badd5240d6724db3e34010aaf35a31876fe4057158
SHA5125849ea147ada06c8b7a9fd523917009c173ace07ba1dbd320d7dda7f6d910b75ba4b7372f22bb56101c9dd836ce1a590b7715a7f34a67a489d70439b88998dd9
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_ctypes.pydFilesize
113KB
MD53a2e78784b929003a6baceebdb0efa4d
SHA1abb48b6a96e22b9bd6d2a8443f5811088c540922
SHA256f205948b01b29cb244ae09c5b57fd4b6c8f356dfcd2f8cb49e7cfd177a748cf9
SHA512ad5a9a5143b7e452d92cc7ea5db12967b2073b626be3437d17041d7ae6d82ee24b15d161d2f708639d3bbf8c657202cd845009a219657557203497ea355876ce
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_decimal.pydFilesize
223KB
MD58601c853146a4be85238a57c9fd56865
SHA1617ccd67b1a4d2d646dd90c33a56fceb624be528
SHA2562a57023d4f355e3857187c02577fa4641a4d1dff195196b3c33b90322edf9fd4
SHA51272a0b4bda2dab4c2d4e76d0d9c9c2569f465ec5f1af6d317c33b6e6a8833a3348d2f018b067305897fdb6125da80d5001769d3f65916c6cd147252bb22024f1b
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_hashlib.pydFilesize
37KB
MD505362add80824b06014645a7951337d8
SHA176699e6dae7df93626906e488ef6218f9afcf8b5
SHA25620b3a3d3350b3d4d57911ecfdb15f77512a6e73c3bf72b410724f81c79a5b1af
SHA512061562b46e38c9bb83d49a9983d9848669ce2a20970451157b6474ef5dcc4ff38cc2a837b03cff89eacb4eae2063d2c1f43fccd6bd481dbbcabc5527f8489f0f
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_lzma.pydFilesize
182KB
MD554f12e2385a77d825ae4d41a4ac515fe
SHA15ba526ac1c5f16fb7db225a4876996ab01ee979f
SHA25608de18fba635822f3bb89c9429f175e3680b7261546430ba9e2ed09bb31f5218
SHA512ea88774fd63a3d806f96e99255705ac68f615508c5887ae18b8d488bdf87268a634c12eb167c13199f4a0fb31795531b1f7d48bdacbd46cf8affa694a630d259
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_queue.pydFilesize
24KB
MD5bc5fce7b8de6ca765cbf79f9d0587164
SHA1d4d56e53ddc6bb5d21697a3460f310e9655525c0
SHA256a5db4d041f40fb01761b5baa907099db89cf891b0df0251d92da2fbf9dc3897b
SHA51223b616ce997eddaafd4c61da7c6d5da1210d0a0373b3df75750843951008234eb2cbe4c6c9a33a4f1cdfe2d115e6c7569d0a97a83ed9c5e85205dba43c5d4363
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_socket.pydFilesize
67KB
MD5cea329ce0935e99a8bc01070f07fefaf
SHA19d81307e9559d0661633530e5756957b05d84268
SHA256d1a4d66c557c2fe7dc441614ca62e67f37ec44bef5a762bac41bac15d491a930
SHA512b6aea9c2221bf35b0895c35942cf3c9613ec7919540b4c24a3b97d7a0846256e9ba654e8f233fadca1b15ff0b7d30d73adfaec85bcadb6100fd73e62d3a068ab
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\_ssl.pydFilesize
139KB
MD5b9ecf769fc63a542a113ca1552dc7a7b
SHA104bd2c2f6f3ae7d8d996c0166d98e0d6aae7b514
SHA256e0bdb16cffc7b5a19c5af22d8a33d3c999d55a3117f2da07ed3171ca9487927e
SHA512593075258548d3ab125ea2f71822662d5ab19c8e036edaf2b92eb63fe721af09fbeae27fdb36e033f654fb55e78a5922a18d5a527fd1c815f691950ba6adcb85
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\amazongen.exe.manifestFilesize
1KB
MD5894d2cb0e7d40a349ed9d1e24f164a14
SHA1c0418c0e1cf25b5f1faa87f10ca519fb5dcbc252
SHA25686c2ef6b274c0c0c68c82601fd338d9641a2ea43ad2f2056c0a0a38f9a59a94f
SHA512fddc439aa3922db050a05b12f88bc2476bf144687cd16e32186d8d2aa1eba11888d458e30ae3d784de6dbb550c4c40d2ec2c15caf14889574d90d2c4f170d801
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\base_library.zipFilesize
761KB
MD5002ab5411c8fa56ee70990f6a06e7d68
SHA10106a4e16ca378ee925a92bc68d9671977952025
SHA256350dcb66d22b55dfdb3ffb9dd0011eb551ca1fddf181d4342922e8b8d27727a8
SHA512c001ced504acb44298a33e88086032011dc138272b02d8f8864b551c2a61f7efaa74d5dd7147ec7c71ff39edd00337055e652ddab0747686d661dd11a2a792ec
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\libcrypto-1_1.dllFilesize
2.1MB
MD573def838c090acd4be070c649cbd3bf1
SHA13dd16cf7740119e7a1d4f56b4c4934a724682e84
SHA25652d89fac9e42d87300e1427cb41c331f78a7e488d0cbbed8db4adf9d930c89d1
SHA5121a1e799cce4986059b53856761810f63829cbc5ead197032ce02e9d3905804d34c8d4d8fcf8a0fe5ac9e5f2f30883f7d4181d0551d4195c2356baf3ff5bd0da8
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\libffi-7.dllFilesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\libssl-1_1.dllFilesize
528KB
MD5ad77250dbaa7faf0c2c9e13d717faec7
SHA1d6450be5a28caac59d47ac620cd128febfbf95ab
SHA256ccba760e6607fb6b08215452a8c0b6f84b2cb13937e86514995e9e86352f487a
SHA512ae89207cd3831b8d0be8b336a9336b69541d1d86e9b9b331d0a64a5bb97c2c9481e735b72bc958bfdb0458f49311b2bd4fcf6d4ca255b7ef510d02de1573c096
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\python38.dllFilesize
3.9MB
MD57e771d92e814a9fe3520b9f1af6176e0
SHA12b1d2fc31fdc2d1940d3835e1e62214414e6cffd
SHA25654326ecd163c7fffcdd02620490b6bde727c6a3153bff9706cf086510e4aa36d
SHA512547bdf9048d3b3bc88741ce2307ed4a48b10407d17dbb9f5ba5a727d59d208069abddb90d24b3d4bf0aa5ced2bdcabec3230baf73f2576652035afe5a1297667
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\select.pydFilesize
23KB
MD526bc7e9826bc13a4d0cf681b0e5cf3c8
SHA1effff42e88cdd66bc4397de1a6d3b5ae540f820b
SHA2568e7366cf6e128f977f8977a8db45a714ba72e643b31bd26b7676f33d3d8df612
SHA51216d92785a234e60301aa6c4c5d508bdaff805689d4f160ab3c0c4d0c2376dd3616f676ad2fa81c08ea80e4fb862c3a15e1b59212508dddb388c8a768726b018a
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\simplejson\_speedups.cp38-win32.pydFilesize
36KB
MD5fe76f7ccd00642a12aaef8b4d60eb85b
SHA1c29ca67b7c148a51c78eb3c0f9621b908775f749
SHA256b8ce7be8c117b6de13318fd5f3e3d2e9dee718dd57162af01d3d28823e06883c
SHA512eb9f266f19d3071cf7e7b68e9b56d1c6cb37eeef41281d5652f64caaa9efdb2c2a764d3ed040eafe8e12b3ebc6d90256620451a56948138c2de43d99d5e95c47
-
C:\Users\Admin\AppData\Local\Temp\_MEI29842\unicodedata.pydFilesize
1.0MB
MD57d24a6d7f45ee7190d867cc92a818ba8
SHA15ff89024f541670d7846cf8cab3747b6a3a9dc1c
SHA256b3df52727dddd333076299f2f8148d1a13bbd39e4481a0ad9a8d88f638d7385b
SHA51228a4af7c30caa116db00790f1f0584b0a0b42dde07f410dddda9caee123bd7082a62c8779bb7aab4931ee0b44343b8e26d5559e63eebe9c581347bb17809da5b