Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 03:56
Static task
static1
Behavioral task
behavioral1
Sample
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe
Resource
win10v2004-20220414-en
General
-
Target
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe
-
Size
277KB
-
MD5
8c1b36b24a67666740ebed501c1280c5
-
SHA1
180af0ea1cd6c180ae5dcf91fbe13c585af40282
-
SHA256
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8
-
SHA512
fb58aa4aef8e0c4f239884ca229405934de696c36d5a44cf36bb4b91a60ef3b0428b70cbaedc3a8f735771ea049f9631a06b5860473c49f008108e3d47935dab
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
gaag.exepid process 1620 gaag.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Edtiep\gaag.exe upx \Users\Admin\AppData\Roaming\Edtiep\gaag.exe upx C:\Users\Admin\AppData\Roaming\Edtiep\gaag.exe upx C:\Users\Admin\AppData\Roaming\Edtiep\gaag.exe upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 516 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exepid process 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gaag.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\Currentversion\Run gaag.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\{5C1D8168-E93A-AD4C-05EB-D0573E9CF34A} = "C:\\Users\\Admin\\AppData\\Roaming\\Edtiep\\gaag.exe" gaag.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exedescription pid process target process PID 1992 set thread context of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe -
Processes:
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Privacy 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
gaag.exepid process 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe 1620 gaag.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exedescription pid process Token: SeSecurityPrivilege 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe Token: SeSecurityPrivilege 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe Token: SeSecurityPrivilege 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exegaag.exedescription pid process target process PID 1992 wrote to memory of 1620 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe gaag.exe PID 1992 wrote to memory of 1620 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe gaag.exe PID 1992 wrote to memory of 1620 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe gaag.exe PID 1992 wrote to memory of 1620 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe gaag.exe PID 1620 wrote to memory of 1136 1620 gaag.exe taskhost.exe PID 1620 wrote to memory of 1136 1620 gaag.exe taskhost.exe PID 1620 wrote to memory of 1136 1620 gaag.exe taskhost.exe PID 1620 wrote to memory of 1136 1620 gaag.exe taskhost.exe PID 1620 wrote to memory of 1136 1620 gaag.exe taskhost.exe PID 1620 wrote to memory of 1240 1620 gaag.exe Dwm.exe PID 1620 wrote to memory of 1240 1620 gaag.exe Dwm.exe PID 1620 wrote to memory of 1240 1620 gaag.exe Dwm.exe PID 1620 wrote to memory of 1240 1620 gaag.exe Dwm.exe PID 1620 wrote to memory of 1240 1620 gaag.exe Dwm.exe PID 1620 wrote to memory of 1288 1620 gaag.exe Explorer.EXE PID 1620 wrote to memory of 1288 1620 gaag.exe Explorer.EXE PID 1620 wrote to memory of 1288 1620 gaag.exe Explorer.EXE PID 1620 wrote to memory of 1288 1620 gaag.exe Explorer.EXE PID 1620 wrote to memory of 1288 1620 gaag.exe Explorer.EXE PID 1620 wrote to memory of 1992 1620 gaag.exe 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe PID 1620 wrote to memory of 1992 1620 gaag.exe 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe PID 1620 wrote to memory of 1992 1620 gaag.exe 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe PID 1620 wrote to memory of 1992 1620 gaag.exe 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe PID 1620 wrote to memory of 1992 1620 gaag.exe 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe PID 1992 wrote to memory of 516 1992 11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe"C:\Users\Admin\AppData\Local\Temp\11771a6754c1edb3b5a3afd972716f49222a69e6e6caa94c4cd6933ab50ca9e8.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Edtiep\gaag.exe"C:\Users\Admin\AppData\Roaming\Edtiep\gaag.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa3330336.bat"3⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpa3330336.batFilesize
307B
MD507fd9e1d1273ac24798020affe399f28
SHA190216acb2154f6eca4e79ba040826ca1bad714a7
SHA256f272dd8820e1d0d4516f106e7a27757552b7304c0a44d96d4f2e188aea71522b
SHA5128057f7b983f064d425162be907ffc4d0b4ec016fd7b6db5ea3c147de8c77d6c2b66d284f989c24a8b8e6008489facffbeb33d2743b55eaf580fa5259240b0525
-
C:\Users\Admin\AppData\Roaming\Edtiep\gaag.exeFilesize
277KB
MD547979805dc1e37a95dd95c859d41efd9
SHA1fbf65b8482af5f226e2c5f87bd70ce9f4fb56982
SHA2563f1640d0201a6927e880ebf115c3551ce82d61625019032c769c357111267466
SHA5122a5d1e1a5b4e1311f92ef1d1dd13d024215fc47137c4a2a111fa3a8f08e272e19bdd50477e24333bfc0db0c0bc4b7a32526ebb992dedffeba238fd1a5dd9f617
-
C:\Users\Admin\AppData\Roaming\Edtiep\gaag.exeFilesize
277KB
MD547979805dc1e37a95dd95c859d41efd9
SHA1fbf65b8482af5f226e2c5f87bd70ce9f4fb56982
SHA2563f1640d0201a6927e880ebf115c3551ce82d61625019032c769c357111267466
SHA5122a5d1e1a5b4e1311f92ef1d1dd13d024215fc47137c4a2a111fa3a8f08e272e19bdd50477e24333bfc0db0c0bc4b7a32526ebb992dedffeba238fd1a5dd9f617
-
C:\Users\Admin\AppData\Roaming\Ygvik\wepo.ujmFilesize
398B
MD5fd11a746878aeb5a13dec4dbecdd05d1
SHA1c09a0e42a786d6b9c90c3b665c2b987c46cc0fb6
SHA2567858512c305f8c02a2a54acb9ff26a8b9240d385a48925c3814db60e7f848aeb
SHA512b6b52e8826ebb4bfa763bff6dc5a41545afca8a16fecc410b7296433f1527490d4d8278892e5852d5cbbccacafaa4676ba5e25002401ad55018157fd75b51c1b
-
\Users\Admin\AppData\Roaming\Edtiep\gaag.exeFilesize
277KB
MD547979805dc1e37a95dd95c859d41efd9
SHA1fbf65b8482af5f226e2c5f87bd70ce9f4fb56982
SHA2563f1640d0201a6927e880ebf115c3551ce82d61625019032c769c357111267466
SHA5122a5d1e1a5b4e1311f92ef1d1dd13d024215fc47137c4a2a111fa3a8f08e272e19bdd50477e24333bfc0db0c0bc4b7a32526ebb992dedffeba238fd1a5dd9f617
-
\Users\Admin\AppData\Roaming\Edtiep\gaag.exeFilesize
277KB
MD547979805dc1e37a95dd95c859d41efd9
SHA1fbf65b8482af5f226e2c5f87bd70ce9f4fb56982
SHA2563f1640d0201a6927e880ebf115c3551ce82d61625019032c769c357111267466
SHA5122a5d1e1a5b4e1311f92ef1d1dd13d024215fc47137c4a2a111fa3a8f08e272e19bdd50477e24333bfc0db0c0bc4b7a32526ebb992dedffeba238fd1a5dd9f617
-
memory/516-89-0x0000000000050000-0x000000000008D000-memory.dmpFilesize
244KB
-
memory/516-100-0x0000000000050000-0x000000000008D000-memory.dmpFilesize
244KB
-
memory/516-93-0x0000000000050000-0x000000000008D000-memory.dmpFilesize
244KB
-
memory/516-95-0x0000000000050000-0x000000000008D000-memory.dmpFilesize
244KB
-
memory/516-96-0x0000000000050000-0x000000000008D000-memory.dmpFilesize
244KB
-
memory/516-97-0x0000000000066EC9-mapping.dmp
-
memory/1136-63-0x0000000000230000-0x000000000026D000-memory.dmpFilesize
244KB
-
memory/1136-66-0x0000000000230000-0x000000000026D000-memory.dmpFilesize
244KB
-
memory/1136-65-0x0000000000230000-0x000000000026D000-memory.dmpFilesize
244KB
-
memory/1136-64-0x0000000000230000-0x000000000026D000-memory.dmpFilesize
244KB
-
memory/1136-61-0x0000000000230000-0x000000000026D000-memory.dmpFilesize
244KB
-
memory/1240-71-0x00000000001B0000-0x00000000001ED000-memory.dmpFilesize
244KB
-
memory/1240-72-0x00000000001B0000-0x00000000001ED000-memory.dmpFilesize
244KB
-
memory/1240-70-0x00000000001B0000-0x00000000001ED000-memory.dmpFilesize
244KB
-
memory/1240-69-0x00000000001B0000-0x00000000001ED000-memory.dmpFilesize
244KB
-
memory/1288-75-0x0000000002AA0000-0x0000000002ADD000-memory.dmpFilesize
244KB
-
memory/1288-76-0x0000000002AA0000-0x0000000002ADD000-memory.dmpFilesize
244KB
-
memory/1288-77-0x0000000002AA0000-0x0000000002ADD000-memory.dmpFilesize
244KB
-
memory/1288-78-0x0000000002AA0000-0x0000000002ADD000-memory.dmpFilesize
244KB
-
memory/1620-101-0x0000000000400000-0x0000000000827000-memory.dmpFilesize
4.2MB
-
memory/1620-57-0x0000000000000000-mapping.dmp
-
memory/1620-92-0x0000000000400000-0x0000000000827000-memory.dmpFilesize
4.2MB
-
memory/1992-82-0x00000000002B0000-0x00000000002ED000-memory.dmpFilesize
244KB
-
memory/1992-94-0x00000000002B0000-0x00000000002ED000-memory.dmpFilesize
244KB
-
memory/1992-54-0x0000000074E91000-0x0000000074E93000-memory.dmpFilesize
8KB
-
memory/1992-81-0x00000000002B0000-0x00000000002ED000-memory.dmpFilesize
244KB
-
memory/1992-90-0x00000000026A0000-0x0000000002AC7000-memory.dmpFilesize
4.2MB
-
memory/1992-84-0x00000000002B0000-0x00000000002ED000-memory.dmpFilesize
244KB
-
memory/1992-88-0x0000000000400000-0x0000000000827000-memory.dmpFilesize
4.2MB
-
memory/1992-83-0x00000000002B0000-0x00000000002ED000-memory.dmpFilesize
244KB