Analysis
-
max time kernel
150s -
max time network
92s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-01-2021 15:25
Static task
static1
Behavioral task
behavioral1
Sample
gvim.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
gvim.exe
Resource
win10v20201028
General
-
Target
gvim.exe
-
Size
3.6MB
-
MD5
8e8f7ff797c292231959e4dd410a98da
-
SHA1
5fba19ae9f76b445d96dbca71f53113492b09d49
-
SHA256
ace9f321c9967b2ffe3bef9056c113b20040fe8831351082e186125aeea8ab0b
-
SHA512
c1e510a6d5f57eaad3b744e20145c07241b1e857e1a1832a0878cd6beedf115a40c8bfd655896d800579110687d208a59416044fdbd2811102aac334720a3c27
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 560 GetX64BTIT.exe -
Drops startup file 1 IoCs
Processes:
DllHost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wsuj.exe DllHost.exe -
Loads dropped DLL 1 IoCs
Processes:
gvim.exepid process 1248 gvim.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 734 IoCs
Processes:
gvim.exegvim.exepid process 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 532 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe 1248 gvim.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
gvim.exedescription pid process Token: SeSecurityPrivilege 532 gvim.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
gvim.exepid process 1248 gvim.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
gvim.exegvim.exedescription pid process target process PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 532 wrote to memory of 1248 532 gvim.exe gvim.exe PID 1248 wrote to memory of 560 1248 gvim.exe GetX64BTIT.exe PID 1248 wrote to memory of 560 1248 gvim.exe GetX64BTIT.exe PID 1248 wrote to memory of 560 1248 gvim.exe GetX64BTIT.exe PID 1248 wrote to memory of 560 1248 gvim.exe GetX64BTIT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gvim.exe"C:\Users\Admin\AppData\Local\Temp\gvim.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\gvim.exe"C:\Users\Admin\AppData\Local\Temp\gvim.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:560
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:1700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\x64btit.txtMD5
7ad4dc61b8b3dfcebe9741190b3fd4fa
SHA13840b22d40a1ee95fc61aadff831cb30c1b80df4
SHA2568967fa5b04d149697539716db8ba0268bb3f0e6eac924b4c3398a5767fe61a92
SHA512fa7dbfb0372123a04a4255fc0401bede663fa7a5ca3b72c165983b91c7b579973e1be46db3a18e3d6c72ca869c305fb749bd1550996f9d85474a4739bd9efb3e
-
\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
memory/532-2-0x0000000075C61000-0x0000000075C63000-memory.dmpFilesize
8KB
-
memory/532-4-0x0000000002EC0000-0x0000000002F3B000-memory.dmpFilesize
492KB
-
memory/532-9-0x0000000002F40000-0x00000000030C0000-memory.dmpFilesize
1.5MB
-
memory/560-14-0x0000000000000000-mapping.dmp
-
memory/1248-5-0x0000000000000000-mapping.dmp
-
memory/1248-6-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1248-10-0x00000000000B0000-0x00000000000B1000-memory.dmpFilesize
4KB
-
memory/1248-11-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1248-12-0x0000000000140000-0x00000000001E9000-memory.dmpFilesize
676KB