Analysis
-
max time kernel
152s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 03:46
Static task
static1
Behavioral task
behavioral1
Sample
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe
Resource
win10v2004-20220812-en
General
-
Target
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe
-
Size
128KB
-
MD5
58a6be3aeede70cb86d871bf2c6a0179
-
SHA1
94670c59d976936b64b255f19d96ef68da4230a0
-
SHA256
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9
-
SHA512
205ad31b4853bbb34e23a332f2f76a9d9c092df0ee8d7fc1904ac8a9b3cbbf38b7624b042b2c03d11b3fcc56f1969de4cf0f0ef245007ccde81266d16eb66926
-
SSDEEP
3072:AEe7VUe3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4SQSsW:e2e3yGFInRO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giawoo.exe -
Executes dropped EXE 1 IoCs
pid Process 964 giawoo.exe -
Loads dropped DLL 2 IoCs
pid Process 1356 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 1356 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ giawoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\giawoo = "C:\\Users\\Admin\\giawoo.exe" giawoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe 964 giawoo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1356 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 964 giawoo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 964 1356 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 28 PID 1356 wrote to memory of 964 1356 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 28 PID 1356 wrote to memory of 964 1356 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 28 PID 1356 wrote to memory of 964 1356 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 28 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16 PID 964 wrote to memory of 1356 964 giawoo.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe"C:\Users\Admin\AppData\Local\Temp\96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\giawoo.exe"C:\Users\Admin\giawoo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD544c9d058e992a6fb97111ac6482cc81f
SHA19826f43f9d027344d292d4dc381565f2d23d4ae6
SHA256e65d5b462fb39589fe5118f9784c38eb294c0c2718ffe323dcb91aac6218af34
SHA512fb43940eec5f9071640132ed535ec900bca5025593c6abea4589abd4271d3560c67a34e9e0fb4bfc878139fdb6dbe4e5332c82455aa67de66169681cd7143494
-
Filesize
128KB
MD544c9d058e992a6fb97111ac6482cc81f
SHA19826f43f9d027344d292d4dc381565f2d23d4ae6
SHA256e65d5b462fb39589fe5118f9784c38eb294c0c2718ffe323dcb91aac6218af34
SHA512fb43940eec5f9071640132ed535ec900bca5025593c6abea4589abd4271d3560c67a34e9e0fb4bfc878139fdb6dbe4e5332c82455aa67de66169681cd7143494
-
Filesize
128KB
MD544c9d058e992a6fb97111ac6482cc81f
SHA19826f43f9d027344d292d4dc381565f2d23d4ae6
SHA256e65d5b462fb39589fe5118f9784c38eb294c0c2718ffe323dcb91aac6218af34
SHA512fb43940eec5f9071640132ed535ec900bca5025593c6abea4589abd4271d3560c67a34e9e0fb4bfc878139fdb6dbe4e5332c82455aa67de66169681cd7143494
-
Filesize
128KB
MD544c9d058e992a6fb97111ac6482cc81f
SHA19826f43f9d027344d292d4dc381565f2d23d4ae6
SHA256e65d5b462fb39589fe5118f9784c38eb294c0c2718ffe323dcb91aac6218af34
SHA512fb43940eec5f9071640132ed535ec900bca5025593c6abea4589abd4271d3560c67a34e9e0fb4bfc878139fdb6dbe4e5332c82455aa67de66169681cd7143494