Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 16:09
Static task
static1
Behavioral task
behavioral1
Sample
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe
-
Size
37KB
-
MD5
5fe7d7e5f9b0babfe5c2ce6dfbea80ee
-
SHA1
3b7aa206b76941b6540adf239ae792f3371ba187
-
SHA256
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010
-
SHA512
4d769b5adff30e204885db925af6a28e63b323126d04609147c331414eb849183ada0e3d4fec0d30a4963b18b1c1ceb0c7284a05aad996339e10eb93e7dcd478
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe -
Drops file in System32 directory 3 IoCs
Processes:
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eXe 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe File created C:\Windows\SysWOW64\GiGu.eml 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe -
Drops file in Windows directory 2 IoCs
Processes:
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exedescription ioc process File created C:\Windows\uGiG.eXe 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe File opened for modification C:\Windows\uGiG.eXe 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3980 1464 WerFault.exe 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exepid process 1464 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe 1464 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe 1464 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe 1464 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe 1464 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe 1464 1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe"C:\Users\Admin\AppData\Local\Temp\1c3fbd71c988ee3f2fd063fea24184e1e2a6d926273664cb60f50f5f27da6010.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 5162⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1464 -ip 14641⤵PID:1112