Analysis
-
max time kernel
151s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 01:32
Static task
static1
Behavioral task
behavioral1
Sample
a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe
Resource
win10v2004-20220812-en
General
-
Target
a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe
-
Size
108KB
-
MD5
729d882fc04be00fe830f70cfe01b6cd
-
SHA1
77e67a2916815d1ddecb991de76aaa307c5f6410
-
SHA256
a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777
-
SHA512
7d6abbde763f205b261ca41f9b373ae3e619521ce457655479e0bccaef32b7b0d3d73d00662e3bb2c912094626cc07ff09a6514ec739334319bfc4d1e8446781
-
SSDEEP
1536:VQX/VtRjes5mBVKuCrENMRs7eSeLwhJt5G35Xm4ofWmkVpgWKBjWSKMvIVh/Ohas:yX/RQCs7eSUWp+Nr8
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" goagut.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe -
Executes dropped EXE 1 IoCs
pid Process 4816 goagut.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /W" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /p" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /q" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /u" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /E" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /R" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /J" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /A" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /i" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /T" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /t" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /a" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /c" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /M" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /O" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /n" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /G" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /P" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /H" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /z" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /d" goagut.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /S" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /U" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /g" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /Y" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /F" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /q" a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /L" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /N" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /r" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /D" goagut.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /C" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /x" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /y" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /Z" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /Q" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /w" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /K" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /j" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /X" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /l" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /B" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /s" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /k" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /f" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /m" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /o" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /V" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /h" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /I" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /e" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /b" goagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goagut = "C:\\Users\\Admin\\goagut.exe /v" goagut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3520 a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe 3520 a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe 4816 goagut.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3520 a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe 4816 goagut.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4816 3520 a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe 82 PID 3520 wrote to memory of 4816 3520 a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe 82 PID 3520 wrote to memory of 4816 3520 a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe"C:\Users\Admin\AppData\Local\Temp\a9724c8927b57c880278c2dcf3912ac50963b73852c0e7df4d117370c4e4a777.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\goagut.exe"C:\Users\Admin\goagut.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5165583d5575036dbf60cab02d4c819c4
SHA1b8bcf72e6c58d9d8b641521233e491cefffbf0f0
SHA256dc6fb8adbe3b8184ee272b54716a7e234158005d59a643f4852d44343abdf1ea
SHA512cdf77ce4e056a8bb0838dea95b93fab8e6c6b3314cce44f73e322a4dfd82eacae3071880739d7c278d8de322776f6bbae22c9e08242c04305b756fbc4b3d6fc8
-
Filesize
108KB
MD5165583d5575036dbf60cab02d4c819c4
SHA1b8bcf72e6c58d9d8b641521233e491cefffbf0f0
SHA256dc6fb8adbe3b8184ee272b54716a7e234158005d59a643f4852d44343abdf1ea
SHA512cdf77ce4e056a8bb0838dea95b93fab8e6c6b3314cce44f73e322a4dfd82eacae3071880739d7c278d8de322776f6bbae22c9e08242c04305b756fbc4b3d6fc8