Analysis
-
max time kernel
163s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
25-03-2022 00:43
Static task
static1
Behavioral task
behavioral1
Sample
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe
Resource
win7-20220310-en
General
-
Target
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe
-
Size
276KB
-
MD5
822285256eafa07724fd29f8e85c759e
-
SHA1
5da5dc2c1be087ce6046f6903a6c773b28a3b6cf
-
SHA256
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
-
SHA512
4d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ggujud.exepid process 4208 ggujud.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 60 api.ipify.org 61 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exedescription ioc process File created C:\Windows\Tasks\ggujud.job 6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe File opened for modification C:\Windows\Tasks\ggujud.job 6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exepid process 2648 6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe 2648 6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe"C:\Users\Admin\AppData\Local\Temp\6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
C:\ProgramData\vhrfoc\ggujud.exeC:\ProgramData\vhrfoc\ggujud.exe start1⤵
- Executes dropped EXE
PID:4208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
822285256eafa07724fd29f8e85c759e
SHA15da5dc2c1be087ce6046f6903a6c773b28a3b6cf
SHA2566cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
SHA5124d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0
-
MD5
822285256eafa07724fd29f8e85c759e
SHA15da5dc2c1be087ce6046f6903a6c773b28a3b6cf
SHA2566cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
SHA5124d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0