Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe
Resource
win10v2004-20220414-en
General
-
Target
130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe
-
Size
2.5MB
-
MD5
8bb9ed74829e5998537c4c3814e33cb6
-
SHA1
37971396d9599d31975100c16e8573ce9265b038
-
SHA256
130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4
-
SHA512
6c90fd66280b2fbca79589c38c2c87a13defb7cadbe2ddb95af4bd58edbb9698cb3ba9da87a57ebe4ce36eca68cb88846f0a697ce24dbeba043a18f14cf5e107
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Executes dropped EXE 4 IoCs
Processes:
irsetup.exeGifRecord.exeGifRecord.exeGifRecord.exepid process 4256 irsetup.exe 2000 GifRecord.exe 5080 GifRecord.exe 3924 GifRecord.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe upx C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exeirsetup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation irsetup.exe -
Loads dropped DLL 5 IoCs
Processes:
irsetup.exerundll32.exerundll32.exepid process 4256 irsetup.exe 1928 rundll32.exe 4012 rundll32.exe 2032 2032 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
GifRecord.exeGifRecord.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GifRecord.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GifRecord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
GifRecord.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\GifRecord.exe = "11000" GifRecord.exe -
Modifies registry class 7 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7B2FACB-BDD2-4D16-ADAB-C826A3ADDBE1}\ = "GifRecord" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7B2FACB-BDD2-4D16-ADAB-C826A3ADDBE1}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7B2FACB-BDD2-4D16-ADAB-C826A3ADDBE1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\GifRecord\\GifRecord.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7B2FACB-BDD2-4D16-ADAB-C826A3ADDBE1}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7B2FACB-BDD2-4D16-ADAB-C826A3ADDBE1}\Implemented Categories rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7B2FACB-BDD2-4D16-ADAB-C826A3ADDBE1}\Implemented Categories\{00021492-0000-0000-C000-000000000046} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7B2FACB-BDD2-4D16-ADAB-C826A3ADDBE1} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GifRecord.exepid process 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe 2000 GifRecord.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
irsetup.exeGifRecord.exeGifRecord.exerundll32.exepid process 4256 irsetup.exe 4256 irsetup.exe 4256 irsetup.exe 2000 GifRecord.exe 5080 GifRecord.exe 4012 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exeirsetup.exerundll32.exedescription pid process target process PID 992 wrote to memory of 4256 992 130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe irsetup.exe PID 992 wrote to memory of 4256 992 130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe irsetup.exe PID 992 wrote to memory of 4256 992 130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe irsetup.exe PID 4256 wrote to memory of 2000 4256 irsetup.exe GifRecord.exe PID 4256 wrote to memory of 2000 4256 irsetup.exe GifRecord.exe PID 4256 wrote to memory of 2000 4256 irsetup.exe GifRecord.exe PID 4256 wrote to memory of 5080 4256 irsetup.exe GifRecord.exe PID 4256 wrote to memory of 5080 4256 irsetup.exe GifRecord.exe PID 4256 wrote to memory of 5080 4256 irsetup.exe GifRecord.exe PID 4256 wrote to memory of 1928 4256 irsetup.exe rundll32.exe PID 4256 wrote to memory of 1928 4256 irsetup.exe rundll32.exe PID 4256 wrote to memory of 1928 4256 irsetup.exe rundll32.exe PID 1928 wrote to memory of 4012 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 4012 1928 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe"C:\Users\Admin\AppData\Local\Temp\130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1828898 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\130e0b1bea3fe7aa551e58de8bb50e83647de48194302ac777c62e200d4d8cd4.exe" "__IRCT:3" "__IRTSS:0" "__IRSID:S-1-5-21-2632097139-1792035885-811742494-1000"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exe"C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exe" -setup3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exe"C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exe" -run3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" /s GifRecord.dll DllGetClassObjectEx3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" /s GifRecord.dll DllGetClassObjectEx4⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exe-run1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exeFilesize
1.3MB
MD57eb6266334c70e3ffa235d2571614734
SHA1de003214a0034ca3dbe9ed35f482f2aaa235c5d7
SHA2560249a947699c4b9678718905d93811a0abb4e1b9528c405f70102ceea68bb00f
SHA512f965de30102d1ca4f305379ce719378dc9bf23fb461318558548df9304154636123b4dea8ce19bc339d53f4c0bfc85205807250fe253d763da08105336ecac0d
-
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exeFilesize
1.3MB
MD57eb6266334c70e3ffa235d2571614734
SHA1de003214a0034ca3dbe9ed35f482f2aaa235c5d7
SHA2560249a947699c4b9678718905d93811a0abb4e1b9528c405f70102ceea68bb00f
SHA512f965de30102d1ca4f305379ce719378dc9bf23fb461318558548df9304154636123b4dea8ce19bc339d53f4c0bfc85205807250fe253d763da08105336ecac0d
-
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dllFilesize
326KB
MD5e7a789232ef503dcb4929791673009a3
SHA18bc28bce4c9d8b4a6e360100441ba54a878de4c1
SHA25689daa79b558055f6f893abf38a0f17d3e1e0193d59dafbdf98d72d4e5961c2a1
SHA5126439a2ec5e9d486c15a37a736bc8d36d8e5f6ecb6a354d0fdd7efc9dccd3fb6bdb208a051b0d81f101669169826e07f9b4ddd79259c79c1e03856af5a9442b87
-
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dllFilesize
326KB
MD5e7a789232ef503dcb4929791673009a3
SHA18bc28bce4c9d8b4a6e360100441ba54a878de4c1
SHA25689daa79b558055f6f893abf38a0f17d3e1e0193d59dafbdf98d72d4e5961c2a1
SHA5126439a2ec5e9d486c15a37a736bc8d36d8e5f6ecb6a354d0fdd7efc9dccd3fb6bdb208a051b0d81f101669169826e07f9b4ddd79259c79c1e03856af5a9442b87
-
C:\Users\Admin\AppData\Local\masm71.datFilesize
27B
MD507a140c7b9625cd352671573f72c0e10
SHA12a83a5c9908937cd675e887e16516c78bc05f156
SHA256ede41fc73c940c9419cc2ef62a9bce5c8215da1d02c97314a44d15eb82b96fe4
SHA51280e0ae186e2648a5809926f71605b8953573a7913dc185618d8d5af46d58415f69575bf8d0e66b1eabd2d6763a12aa3f8027adc9ba132bff4a772186599a9960
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.cfgFilesize
113B
MD5fe794baf1f42ddfbee4485742f8ddc51
SHA1ae6d789a956e7167d19f63ba98feea56901522c3
SHA256cb311b79f4758ac7fc88916893e5a34cc0c2c5c2741bccbafafc397a889be185
SHA512970b956ffd33aad7612efca64ed9bcb9da2da9abcc8fbf8a6f6cf5e634287255bdb128a07a6cb03ed342e82046e933bf4ab45544e61188f54efb41530d9ccbbf
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.cfgFilesize
161B
MD510c54cbd2106668e4bb4ed4123bcbc04
SHA159f86d730812896dc8ccd9b5124fcb3f35800b45
SHA2565fd0fd986f92798d410be61845e1d723e73ab1d54301babc26bf4b0fd4c3de28
SHA512aa2bcbd9f922e59e3faf5486a06cd5c29570a176a4719e727fb03e86d8e9eb5f86545ca9eb1c22f70274e70a2159fa28e8030124e8bf9ff417fdc42a636012d6
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.cfgFilesize
210B
MD5be7ef2841a2137792d2e21fdc7c95587
SHA139ab41ad47864e2ee1759d9fe5779016bcfd92d6
SHA256a7c6c13861355ec8fd25cd92df1745e9ebcfbffdee543b42f9a7324514168683
SHA51276754452d7ae42884fa1f00b15775ea807f9abd3c9df3f389f38886623173d19ef7bba449bc192665f6cc2ebf16143c17156cbc0b68c1d067853dcbd3c77db81
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.dllFilesize
354KB
MD542448fbdd7518ec2621a2be25e08f9a1
SHA14536e8cb9adda29834ec77100bf60dc60ccb0d9c
SHA2564fc5d1be5dcb0eae871c91f932a016866cabb7e8bef62cd872a4038304d5b6b3
SHA5123a5bec44c81de1b01ea70db218af23b282b9f7f37e648e9a12effd7e4b76d5108a6d03a5ba33a43c49a5ef5a900c76e75c38fddc8c806b24f0642bad2e378c3b
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.dllFilesize
354KB
MD542448fbdd7518ec2621a2be25e08f9a1
SHA14536e8cb9adda29834ec77100bf60dc60ccb0d9c
SHA2564fc5d1be5dcb0eae871c91f932a016866cabb7e8bef62cd872a4038304d5b6b3
SHA5123a5bec44c81de1b01ea70db218af23b282b9f7f37e648e9a12effd7e4b76d5108a6d03a5ba33a43c49a5ef5a900c76e75c38fddc8c806b24f0642bad2e378c3b
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.dllFilesize
354KB
MD542448fbdd7518ec2621a2be25e08f9a1
SHA14536e8cb9adda29834ec77100bf60dc60ccb0d9c
SHA2564fc5d1be5dcb0eae871c91f932a016866cabb7e8bef62cd872a4038304d5b6b3
SHA5123a5bec44c81de1b01ea70db218af23b282b9f7f37e648e9a12effd7e4b76d5108a6d03a5ba33a43c49a5ef5a900c76e75c38fddc8c806b24f0642bad2e378c3b
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.dllFilesize
354KB
MD542448fbdd7518ec2621a2be25e08f9a1
SHA14536e8cb9adda29834ec77100bf60dc60ccb0d9c
SHA2564fc5d1be5dcb0eae871c91f932a016866cabb7e8bef62cd872a4038304d5b6b3
SHA5123a5bec44c81de1b01ea70db218af23b282b9f7f37e648e9a12effd7e4b76d5108a6d03a5ba33a43c49a5ef5a900c76e75c38fddc8c806b24f0642bad2e378c3b
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.dllFilesize
354KB
MD542448fbdd7518ec2621a2be25e08f9a1
SHA14536e8cb9adda29834ec77100bf60dc60ccb0d9c
SHA2564fc5d1be5dcb0eae871c91f932a016866cabb7e8bef62cd872a4038304d5b6b3
SHA5123a5bec44c81de1b01ea70db218af23b282b9f7f37e648e9a12effd7e4b76d5108a6d03a5ba33a43c49a5ef5a900c76e75c38fddc8c806b24f0642bad2e378c3b
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exeFilesize
954KB
MD5c7f4406ead0af29e975704af853054d1
SHA1c0dbc136ea31d192972002b38a2e96fadc377d70
SHA2565ea1eff6d23ce7675cb9814e05311106f6302925fa1e39ffbf5de8b740146ef9
SHA512bc8f512ed40fa221d943663fd91b6fac8c3359145c00d934a7c8bdfd72984962f18848c2b9a1ff1b53833084c854b4b24f1e75107e8e58eb9376e299147b45d6
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exeFilesize
954KB
MD5c7f4406ead0af29e975704af853054d1
SHA1c0dbc136ea31d192972002b38a2e96fadc377d70
SHA2565ea1eff6d23ce7675cb9814e05311106f6302925fa1e39ffbf5de8b740146ef9
SHA512bc8f512ed40fa221d943663fd91b6fac8c3359145c00d934a7c8bdfd72984962f18848c2b9a1ff1b53833084c854b4b24f1e75107e8e58eb9376e299147b45d6
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exeFilesize
954KB
MD5c7f4406ead0af29e975704af853054d1
SHA1c0dbc136ea31d192972002b38a2e96fadc377d70
SHA2565ea1eff6d23ce7675cb9814e05311106f6302925fa1e39ffbf5de8b740146ef9
SHA512bc8f512ed40fa221d943663fd91b6fac8c3359145c00d934a7c8bdfd72984962f18848c2b9a1ff1b53833084c854b4b24f1e75107e8e58eb9376e299147b45d6
-
C:\Users\Admin\AppData\Roaming\GifRecord\GifRecord.exeFilesize
954KB
MD5c7f4406ead0af29e975704af853054d1
SHA1c0dbc136ea31d192972002b38a2e96fadc377d70
SHA2565ea1eff6d23ce7675cb9814e05311106f6302925fa1e39ffbf5de8b740146ef9
SHA512bc8f512ed40fa221d943663fd91b6fac8c3359145c00d934a7c8bdfd72984962f18848c2b9a1ff1b53833084c854b4b24f1e75107e8e58eb9376e299147b45d6
-
memory/1928-141-0x0000000000000000-mapping.dmp
-
memory/2000-135-0x0000000000000000-mapping.dmp
-
memory/4012-144-0x0000000000000000-mapping.dmp
-
memory/4256-130-0x0000000000000000-mapping.dmp
-
memory/5080-139-0x0000000000000000-mapping.dmp