Analysis
-
max time kernel
191s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 00:12
Static task
static1
Behavioral task
behavioral1
Sample
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe
Resource
win10v2004-20220812-en
General
-
Target
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe
-
Size
292KB
-
MD5
a28be5d5de12ab68efb32540b245c820
-
SHA1
213c7423cbf1d8127fce79e10cc5af2683e508e1
-
SHA256
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5
-
SHA512
aaf98f2cd65c1f51a85b6937e75897446c2f0552da34de128058a9ac9e1bfc13372bc5e4c331dde86c9475f7776c60bac635901b28721452fa9f259c89ef7218
-
SSDEEP
6144:4aczAnqtrZjQCBBvfmge2uXOyDDaX66UEbuGHAceNEFKLrLRKD7ucfnxh4B7yCJe:4a3nqttp9K5CooEeOnio
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gyfaef.exe -
Executes dropped EXE 1 IoCs
pid Process 2132 gyfaef.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /r" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /t" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /w" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /x" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /a" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /l" gyfaef.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /c" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /d" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /h" 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /j" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /u" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /b" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /h" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /m" gyfaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gyfaef = "C:\\Users\\Admin\\gyfaef.exe /z" gyfaef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4980 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 4980 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe 2132 gyfaef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4980 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 2132 gyfaef.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2132 4980 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 82 PID 4980 wrote to memory of 2132 4980 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 82 PID 4980 wrote to memory of 2132 4980 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe"C:\Users\Admin\AppData\Local\Temp\5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\gyfaef.exe"C:\Users\Admin\gyfaef.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5c48e5bb0f3f7e11d1be3a86838108b5e
SHA1fd779a484eb95e5297d1e0d486304271f7c58c74
SHA256f6efdf0c5ee19b3ba99bd5575699f32c6fd8c0cb060b9ec088d05801cda4d9d7
SHA51237ea09ad747e3bcd2494db3e2864aa51b5060cf02b66100cd64072c5d788cd6e3172a393dcb0b7106e51f3ed500a699c390abaa05441f1034c9490dedb6f9ac9
-
Filesize
292KB
MD5c48e5bb0f3f7e11d1be3a86838108b5e
SHA1fd779a484eb95e5297d1e0d486304271f7c58c74
SHA256f6efdf0c5ee19b3ba99bd5575699f32c6fd8c0cb060b9ec088d05801cda4d9d7
SHA51237ea09ad747e3bcd2494db3e2864aa51b5060cf02b66100cd64072c5d788cd6e3172a393dcb0b7106e51f3ed500a699c390abaa05441f1034c9490dedb6f9ac9