Analysis
-
max time kernel
26s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe
Resource
win10v2004-20220901-en
General
-
Target
54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe
-
Size
464KB
-
MD5
917eb962b83808522dec4fd3801e7d46
-
SHA1
de6f369443113fff911f75488b5327239020f028
-
SHA256
54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9
-
SHA512
83da0b92fe548b9df44a0f176d05052d0826361b208f8fd6f37bbdc49b63c5d853916a0061a08756cf8b87b871ebe54a2874b57d07747a8bfb26ddb4bbe24d78
-
SSDEEP
6144:qSnvrLh+QkCL4URaAUBbAp41bTQwLsWEI+QzT5e+HcR01:qSnTLICDQbApoHQOsWEqzJHcG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 580 gcfsggcj.exe -
Deletes itself 1 IoCs
pid Process 1004 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1004 cmd.exe 1004 cmd.exe 580 gcfsggcj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1232 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1644 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1232 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1004 1932 54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe 28 PID 1932 wrote to memory of 1004 1932 54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe 28 PID 1932 wrote to memory of 1004 1932 54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe 28 PID 1932 wrote to memory of 1004 1932 54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe 28 PID 1004 wrote to memory of 1232 1004 cmd.exe 30 PID 1004 wrote to memory of 1232 1004 cmd.exe 30 PID 1004 wrote to memory of 1232 1004 cmd.exe 30 PID 1004 wrote to memory of 1232 1004 cmd.exe 30 PID 1004 wrote to memory of 1644 1004 cmd.exe 32 PID 1004 wrote to memory of 1644 1004 cmd.exe 32 PID 1004 wrote to memory of 1644 1004 cmd.exe 32 PID 1004 wrote to memory of 1644 1004 cmd.exe 32 PID 1004 wrote to memory of 580 1004 cmd.exe 33 PID 1004 wrote to memory of 580 1004 cmd.exe 33 PID 1004 wrote to memory of 580 1004 cmd.exe 33 PID 1004 wrote to memory of 580 1004 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe"C:\Users\Admin\AppData\Local\Temp\54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1932 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\54fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9.exe" & start C:\Users\Admin\AppData\Local\gcfsggcj.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 19323⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1644
-
-
C:\Users\Admin\AppData\Local\gcfsggcj.exeC:\Users\Admin\AppData\Local\gcfsggcj.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD5917eb962b83808522dec4fd3801e7d46
SHA1de6f369443113fff911f75488b5327239020f028
SHA25654fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9
SHA51283da0b92fe548b9df44a0f176d05052d0826361b208f8fd6f37bbdc49b63c5d853916a0061a08756cf8b87b871ebe54a2874b57d07747a8bfb26ddb4bbe24d78
-
Filesize
464KB
MD5917eb962b83808522dec4fd3801e7d46
SHA1de6f369443113fff911f75488b5327239020f028
SHA25654fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9
SHA51283da0b92fe548b9df44a0f176d05052d0826361b208f8fd6f37bbdc49b63c5d853916a0061a08756cf8b87b871ebe54a2874b57d07747a8bfb26ddb4bbe24d78
-
Filesize
464KB
MD5917eb962b83808522dec4fd3801e7d46
SHA1de6f369443113fff911f75488b5327239020f028
SHA25654fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9
SHA51283da0b92fe548b9df44a0f176d05052d0826361b208f8fd6f37bbdc49b63c5d853916a0061a08756cf8b87b871ebe54a2874b57d07747a8bfb26ddb4bbe24d78
-
Filesize
464KB
MD5917eb962b83808522dec4fd3801e7d46
SHA1de6f369443113fff911f75488b5327239020f028
SHA25654fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9
SHA51283da0b92fe548b9df44a0f176d05052d0826361b208f8fd6f37bbdc49b63c5d853916a0061a08756cf8b87b871ebe54a2874b57d07747a8bfb26ddb4bbe24d78
-
Filesize
464KB
MD5917eb962b83808522dec4fd3801e7d46
SHA1de6f369443113fff911f75488b5327239020f028
SHA25654fa86186d06317c3fd5fc7b7016c77b07569d9d4c37bb953fecc6dd6ea79fe9
SHA51283da0b92fe548b9df44a0f176d05052d0826361b208f8fd6f37bbdc49b63c5d853916a0061a08756cf8b87b871ebe54a2874b57d07747a8bfb26ddb4bbe24d78