Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe
Resource
win10v2004-20220812-en
General
-
Target
4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe
-
Size
280KB
-
MD5
846330352f436b321380f4c37786d3c0
-
SHA1
529888d9dd2ab863de356dd2840d66c04f173dae
-
SHA256
4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c
-
SHA512
9d91a0813d02917685bfdbb458f0bc7253dbc8580af1cb288397b74f9e7a1b21c119fe9b8f969a4e78e588e6e23563c54269e3a4ae9c752f56e4546e70565e4b
-
SSDEEP
3072:IaB/LiHOPiu8aQe3TqDUCiGjHJDbRv9y+qwa+rZf/M2BX09:V/LiHOf3TqD+0HBb5ta+rZ3Maq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaeat.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe -
Executes dropped EXE 1 IoCs
pid Process 1556 gaeat.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /O" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /L" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /z" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /k" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /p" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /F" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /i" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /V" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /h" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /b" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /D" 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /m" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /P" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /D" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /q" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /y" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /B" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /u" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /e" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /G" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /I" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /W" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /A" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /g" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /l" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /v" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /N" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /a" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /c" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /C" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /Z" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /j" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /H" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /X" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /R" gaeat.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /x" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /s" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /Q" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /S" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /T" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /U" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /n" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /o" gaeat.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /E" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /r" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /K" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /t" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /f" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /d" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /M" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /J" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /w" gaeat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeat = "C:\\Users\\Admin\\gaeat.exe /Y" gaeat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 364 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe 364 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe 1556 gaeat.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 364 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe 1556 gaeat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 364 wrote to memory of 1556 364 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe 80 PID 364 wrote to memory of 1556 364 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe 80 PID 364 wrote to memory of 1556 364 4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe"C:\Users\Admin\AppData\Local\Temp\4b41d19412805220a21cbbc525ae0b8e23bf6f919c5d3c9811f787b07653c18c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\gaeat.exe"C:\Users\Admin\gaeat.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD55f17d362da3c7935dc95d0ef24c9584e
SHA1b9836bd0f264ed682a2b14736e86cde0acd5fb92
SHA256758232062c0b9c42267e467920585796cc3fc5faffc9be108bf152f4834d1e48
SHA5128aa6d881e577cb01b8a5eb67d2f2900cee7e41934dbe0dec2b3f3401bb03f7d765569e355be0d4343dde60363f35b8493e515a09870431aced923c9dab59d18d
-
Filesize
280KB
MD55f17d362da3c7935dc95d0ef24c9584e
SHA1b9836bd0f264ed682a2b14736e86cde0acd5fb92
SHA256758232062c0b9c42267e467920585796cc3fc5faffc9be108bf152f4834d1e48
SHA5128aa6d881e577cb01b8a5eb67d2f2900cee7e41934dbe0dec2b3f3401bb03f7d765569e355be0d4343dde60363f35b8493e515a09870431aced923c9dab59d18d