Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 18:12
Static task
static1
Behavioral task
behavioral1
Sample
Gemini.bat
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Gemini.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Gemini.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Gemini.exe
Resource
win10v2004-20220414-en
General
-
Target
Gemini.exe
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Gemini.exeGemini.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation Gemini.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation Gemini.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Gemini.exedescription ioc process File opened for modification \??\PhysicalDrive0 Gemini.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
Processes:
calc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\Local Settings calc.exe -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 4840 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Gemini.exeGemini.exeGemini.exeGemini.exeGemini.exepid process 3484 Gemini.exe 3484 Gemini.exe 4680 Gemini.exe 4692 Gemini.exe 4680 Gemini.exe 4692 Gemini.exe 3484 Gemini.exe 3484 Gemini.exe 3484 Gemini.exe 3484 Gemini.exe 4680 Gemini.exe 4680 Gemini.exe 4692 Gemini.exe 4692 Gemini.exe 4680 Gemini.exe 4680 Gemini.exe 3484 Gemini.exe 3484 Gemini.exe 4692 Gemini.exe 4692 Gemini.exe 3104 Gemini.exe 3104 Gemini.exe 3484 Gemini.exe 3484 Gemini.exe 4680 Gemini.exe 4680 Gemini.exe 3652 Gemini.exe 3652 Gemini.exe 4692 Gemini.exe 4692 Gemini.exe 3652 Gemini.exe 3652 Gemini.exe 4680 Gemini.exe 4680 Gemini.exe 3484 Gemini.exe 3104 Gemini.exe 3484 Gemini.exe 3104 Gemini.exe 4692 Gemini.exe 4692 Gemini.exe 4680 Gemini.exe 3104 Gemini.exe 4680 Gemini.exe 3104 Gemini.exe 3484 Gemini.exe 3652 Gemini.exe 3484 Gemini.exe 3652 Gemini.exe 4692 Gemini.exe 4692 Gemini.exe 3484 Gemini.exe 3652 Gemini.exe 3484 Gemini.exe 3652 Gemini.exe 4680 Gemini.exe 4680 Gemini.exe 3104 Gemini.exe 3104 Gemini.exe 4692 Gemini.exe 4692 Gemini.exe 3104 Gemini.exe 4680 Gemini.exe 3104 Gemini.exe 4680 Gemini.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3680 msedge.exe 3680 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 112 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 112 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msedge.exepid process 3680 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
Gemini.exeOpenWith.exewordpad.exepid process 4164 Gemini.exe 3360 OpenWith.exe 2096 wordpad.exe 2096 wordpad.exe 2096 wordpad.exe 2096 wordpad.exe 2096 wordpad.exe 2096 wordpad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Gemini.exeGemini.exewordpad.exemsedge.exedescription pid process target process PID 2416 wrote to memory of 3484 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3484 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3484 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4692 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4692 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4692 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4680 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4680 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4680 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3652 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3652 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3652 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3104 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3104 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 3104 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4164 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4164 2416 Gemini.exe Gemini.exe PID 2416 wrote to memory of 4164 2416 Gemini.exe Gemini.exe PID 4164 wrote to memory of 4480 4164 Gemini.exe notepad.exe PID 4164 wrote to memory of 4480 4164 Gemini.exe notepad.exe PID 4164 wrote to memory of 4480 4164 Gemini.exe notepad.exe PID 4164 wrote to memory of 4840 4164 Gemini.exe regedit.exe PID 4164 wrote to memory of 4840 4164 Gemini.exe regedit.exe PID 4164 wrote to memory of 4840 4164 Gemini.exe regedit.exe PID 4164 wrote to memory of 1592 4164 Gemini.exe calc.exe PID 4164 wrote to memory of 1592 4164 Gemini.exe calc.exe PID 4164 wrote to memory of 1592 4164 Gemini.exe calc.exe PID 4164 wrote to memory of 2096 4164 Gemini.exe wordpad.exe PID 4164 wrote to memory of 2096 4164 Gemini.exe wordpad.exe PID 4164 wrote to memory of 2096 4164 Gemini.exe wordpad.exe PID 2096 wrote to memory of 2840 2096 wordpad.exe splwow64.exe PID 2096 wrote to memory of 2840 2096 wordpad.exe splwow64.exe PID 4164 wrote to memory of 3680 4164 Gemini.exe msedge.exe PID 4164 wrote to memory of 3680 4164 Gemini.exe msedge.exe PID 3680 wrote to memory of 360 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 360 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe PID 3680 wrote to memory of 3820 3680 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Gemini.exe"C:\Users\Admin\AppData\Local\Temp\Gemini.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Gemini.exe"C:\Users\Admin\AppData\Local\Temp\Gemini.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\Gemini.exe"C:\Users\Admin\AppData\Local\Temp\Gemini.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\Gemini.exe"C:\Users\Admin\AppData\Local\Temp\Gemini.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\Gemini.exe"C:\Users\Admin\AppData\Local\Temp\Gemini.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\Gemini.exe"C:\Users\Admin\AppData\Local\Temp\Gemini.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\Gemini.exe"C:\Users\Admin\AppData\Local\Temp\Gemini.exe" /main2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:4480
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
PID:4840
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
- Modifies registry class
PID:1592
-
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:2840
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x114,0x118,0x11c,0xf0,0x120,0x7ffb0a7546f8,0x7ffb0a754708,0x7ffb0a7547184⤵PID:360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12353268497756538613,8653130877592078926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:24⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12353268497756538613,8653130877592078926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:34⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12353268497756538613,8653130877592078926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:84⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12353268497756538613,8653130877592078926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:14⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12353268497756538613,8653130877592078926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:14⤵PID:3064
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3288
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x434 0x3cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e