Analysis
-
max time kernel
152s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 10:50
Behavioral task
behavioral1
Sample
afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe
Resource
win10v2004-20220812-en
General
-
Target
afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe
-
Size
331KB
-
MD5
81625a06754f3d589d1991e6a24d8c42
-
SHA1
7a8c7765729d585290a592a532d0f2b58d7dda01
-
SHA256
afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4
-
SHA512
a6cfd90da1fc59631b29fc981f74950f27a15b4bbb26e3a53b38f3015307c03f3b0e170242cd6013054fe6a83533839c0dfdcf198b7e77512c2d7e133006de46
-
SSDEEP
6144:FYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UOwz:FSNC80I+cR3R03VseuOwz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe gphone.exe" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2004-54-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral1/memory/2004-62-0x0000000000400000-0x00000000004B0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\gphone.exe" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\b: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\o: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\p: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\q: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\s: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\x: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\y: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\e: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\k: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\m: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\n: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\v: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\w: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\u: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\z: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\f: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\g: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\i: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\j: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\l: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\r: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\h: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened (read-only) \??\t: afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2004-62-0x0000000000400000-0x00000000004B0000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\d:\autorun.inf afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gphone.exe afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened for modification C:\Windows\SysWOW64\gphone.exe afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File opened for modification C:\Windows\SysWOW64\autorun.ini afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\gphone.exe afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe File created C:\Windows\gphone.exe afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://rnd009.googlepages.com/google.html" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://rnd009.googlepages.com/google.html" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://rnd009.googlepages.com/google.html" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://rnd009.googlepages.com/google.html" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://rnd009.googlepages.com/google.html" afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2004 wrote to memory of 944 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 28 PID 2004 wrote to memory of 944 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 28 PID 2004 wrote to memory of 944 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 28 PID 2004 wrote to memory of 944 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 28 PID 944 wrote to memory of 744 944 cmd.exe 30 PID 944 wrote to memory of 744 944 cmd.exe 30 PID 944 wrote to memory of 744 944 cmd.exe 30 PID 944 wrote to memory of 744 944 cmd.exe 30 PID 2004 wrote to memory of 1456 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 31 PID 2004 wrote to memory of 1456 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 31 PID 2004 wrote to memory of 1456 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 31 PID 2004 wrote to memory of 1456 2004 afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe 31 PID 1456 wrote to memory of 1436 1456 cmd.exe 33 PID 1456 wrote to memory of 1436 1456 cmd.exe 33 PID 1456 wrote to memory of 1436 1456 cmd.exe 33 PID 1456 wrote to memory of 1436 1456 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe"C:\Users\Admin\AppData\Local\Temp\afcf2979a03ecf60292dd1c0c7ffe11dad8eacb62b6166b1de82c36a333692e4.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe3⤵PID:1436
-
-