Analysis
-
max time kernel
48s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 19:40
Static task
static1
Behavioral task
behavioral1
Sample
gh.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
gh.exe
Resource
win10v2004-20220414-en
General
-
Target
gh.exe
-
Size
1.9MB
-
MD5
fc2f9bb8ec49b7a862a994d7793cfbfa
-
SHA1
2ac1aa2e6884a811b5517564efeb101bcd6acf23
-
SHA256
ba42981857aaa86ac3ebfa7c169d3abff15ef53a857770d70fa4808a90238d67
-
SHA512
56b2f07acf0346e04894ac1bef83515bdda00a0d27262a4abe34799dc49ca996f796fda541fd6d3edda7f05187c9500f52ef694a3c1ddac3839b3047bef66524
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
gh.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\rundll.exe\"," gh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
powershell.exepowershell.exegh.exepid process 1896 powershell.exe 1376 powershell.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe 2036 gh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exegh.exepowershell.exedescription pid process Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 2036 gh.exe Token: SeDebugPrivilege 1376 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
gh.exedescription pid process target process PID 2036 wrote to memory of 1896 2036 gh.exe powershell.exe PID 2036 wrote to memory of 1896 2036 gh.exe powershell.exe PID 2036 wrote to memory of 1896 2036 gh.exe powershell.exe PID 2036 wrote to memory of 1376 2036 gh.exe powershell.exe PID 2036 wrote to memory of 1376 2036 gh.exe powershell.exe PID 2036 wrote to memory of 1376 2036 gh.exe powershell.exe PID 2036 wrote to memory of 1740 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1740 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1740 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1732 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1732 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1732 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1868 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1868 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1868 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 980 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 980 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 980 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1472 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1472 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1472 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1688 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1688 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1688 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1532 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1532 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1532 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 300 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 300 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 300 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1636 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1636 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 1636 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 656 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 656 2036 gh.exe InstallUtil.exe PID 2036 wrote to memory of 656 2036 gh.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gh.exe"C:\Users\Admin\AppData\Local\Temp\gh.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AEEAcgB0AC0AUwBsAEUAZQBQACAALQBzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAJwAsACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXAByAHUAbgBkAGwAbAAuAGUAeABlACcA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5e92a33e6128cb38b5fcd8d3816e76dcc
SHA1d492bdd91bbb5b5d59b270d7c18476ed77fe1bf6
SHA256383529d5dd156d8b560bca6e8dbb35158e253838db2ef81f18fc724a01c09890
SHA5129ebc9b6ce9cf632ded30ae0630c1b7bd855820fae0fbdb8ac0a7940158f6a5a88ca63368738710179da5d560345d7b2bee47ac90b636ff77cbfb97ebdc8bcde2
-
memory/1376-65-0x0000000000000000-mapping.dmp
-
memory/1376-72-0x000000000284B000-0x000000000286A000-memory.dmpFilesize
124KB
-
memory/1376-71-0x000000001B7A0000-0x000000001BA9F000-memory.dmpFilesize
3.0MB
-
memory/1376-70-0x0000000002844000-0x0000000002847000-memory.dmpFilesize
12KB
-
memory/1376-69-0x000007FEEC640000-0x000007FEED19D000-memory.dmpFilesize
11.4MB
-
memory/1376-68-0x000007FEED1A0000-0x000007FEEDBC3000-memory.dmpFilesize
10.1MB
-
memory/1896-60-0x00000000027D4000-0x00000000027D7000-memory.dmpFilesize
12KB
-
memory/1896-62-0x00000000027DB000-0x00000000027FA000-memory.dmpFilesize
124KB
-
memory/1896-61-0x000000001B700000-0x000000001B9FF000-memory.dmpFilesize
3.0MB
-
memory/1896-59-0x000007FEECFE0000-0x000007FEEDB3D000-memory.dmpFilesize
11.4MB
-
memory/1896-58-0x000007FEEDB40000-0x000007FEEE563000-memory.dmpFilesize
10.1MB
-
memory/1896-56-0x0000000000000000-mapping.dmp
-
memory/2036-63-0x000000001D780000-0x000000001D95E000-memory.dmpFilesize
1.9MB
-
memory/2036-64-0x000000001C3C6000-0x000000001C3E5000-memory.dmpFilesize
124KB
-
memory/2036-54-0x000000013F740000-0x000000013F920000-memory.dmpFilesize
1.9MB
-
memory/2036-55-0x000007FEFBD81000-0x000007FEFBD83000-memory.dmpFilesize
8KB
-
memory/2036-73-0x000000001BE00000-0x000000001BEAA000-memory.dmpFilesize
680KB