Analysis
-
max time kernel
92s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 21:57
Behavioral task
behavioral1
Sample
d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe
Resource
win10v2004-20220812-en
General
-
Target
d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe
-
Size
186KB
-
MD5
84bff1674e57a0375ad391d5f001e878
-
SHA1
df84010c444887f26ec4d18c4bcc84bbf6ad84d4
-
SHA256
d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8
-
SHA512
cafc87a9cbf84b028fe403fe912407e93fc6919476d243273ed8d46567746cc76e361d621987ce9d6982fb8ec70747ce68fdc64079da1cb9c678a95bc0030b65
-
SSDEEP
3072:iRGDLh8/CGLpBZFwugYmgCaKEcDf8wUpbOy3Xwlg7z9oK5ycJrnViMC0HzylkNVj:ioDV9WbZkTaKRf8XbFbd75fJrVJvmCL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 Gbonea.exe -
resource yara_rule behavioral2/memory/1360-132-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/files/0x0007000000022f77-138.dat upx behavioral2/files/0x0007000000022f77-139.dat upx behavioral2/memory/2360-140-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Gbonea.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Gbonea.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe File created C:\Windows\Gbonea.exe d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe File opened for modification C:\Windows\Gbonea.exe d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 552 2360 WerFault.exe 81 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main Gbonea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe 2360 Gbonea.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 Gbonea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2360 1360 d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe 81 PID 1360 wrote to memory of 2360 1360 d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe 81 PID 1360 wrote to memory of 2360 1360 d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe"C:\Users\Admin\AppData\Local\Temp\d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\Gbonea.exeC:\Windows\Gbonea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 8163⤵
- Program crash
PID:552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2360 -ip 23601⤵PID:3464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD584bff1674e57a0375ad391d5f001e878
SHA1df84010c444887f26ec4d18c4bcc84bbf6ad84d4
SHA256d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8
SHA512cafc87a9cbf84b028fe403fe912407e93fc6919476d243273ed8d46567746cc76e361d621987ce9d6982fb8ec70747ce68fdc64079da1cb9c678a95bc0030b65
-
Filesize
186KB
MD584bff1674e57a0375ad391d5f001e878
SHA1df84010c444887f26ec4d18c4bcc84bbf6ad84d4
SHA256d1bfd70af68d203ada141dcf38f11d36484a591bc771fd6f14aabcb01d2070e8
SHA512cafc87a9cbf84b028fe403fe912407e93fc6919476d243273ed8d46567746cc76e361d621987ce9d6982fb8ec70747ce68fdc64079da1cb9c678a95bc0030b65
-
Filesize
426B
MD52e7a74b9b39890c474104c9114c5af3f
SHA147ce7beaac87ac3b0e320efffa631ba3fb77c72f
SHA256e192a9e76e610d79d8167be78c424a8025d4dfd2124c37d2308f4aa65fcfdbc8
SHA5126d6b05430e23ae6ae9adfec90ed50d089b5433521863b6722c086f5d9f3e6e09cb460ad782ec1bde529b235314c1aed1994d46e62c936d13426523bf5ddb3043