Analysis
-
max time kernel
178s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 00:58
Behavioral task
behavioral1
Sample
ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe
Resource
win10v2004-20220812-en
General
-
Target
ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe
-
Size
336KB
-
MD5
92a5f21fdd86fd6ebd1be7dc1dac74ab
-
SHA1
333c588dfcdafbcd8ab492964529f2c4fb50ac18
-
SHA256
ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b
-
SHA512
0aa2a54f9069e87e7b735c38afa63f49304be42de71e1007dd11e925eb6d2056facaf7a37f3f0c3ddf39400301bc9aeda08e8c7eba9a1f19364131921f374059
-
SSDEEP
6144:fYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UOV7KhkMH:fSNC80I+cR3R03VseuOVwkMH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe gphone.exe" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/4892-132-0x0000000000400000-0x00000000004AD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\gphone.exe" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\f: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\h: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\o: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\v: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\w: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\a: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\l: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\u: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\y: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\z: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\g: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\j: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\m: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\q: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\r: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\s: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\x: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\b: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\i: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\k: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\n: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\p: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened (read-only) \??\t: ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\d:\autorun.inf ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gphone.exe ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened for modification C:\Windows\SysWOW64\gphone.exe ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened for modification C:\Windows\SysWOW64\autorun.ini ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gphone.exe ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe File opened for modification C:\Windows\gphone.exe ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://rnd009.googlepages.com/google.html" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://rnd009.googlepages.com/google.html" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://rnd009.googlepages.com/google.html" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://rnd009.googlepages.com/google.html" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://rnd009.googlepages.com/google.html" ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4892 wrote to memory of 176 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 82 PID 4892 wrote to memory of 176 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 82 PID 4892 wrote to memory of 176 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 82 PID 176 wrote to memory of 1180 176 cmd.exe 84 PID 176 wrote to memory of 1180 176 cmd.exe 84 PID 176 wrote to memory of 1180 176 cmd.exe 84 PID 4892 wrote to memory of 3912 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 85 PID 4892 wrote to memory of 3912 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 85 PID 4892 wrote to memory of 3912 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 85 PID 3912 wrote to memory of 2604 3912 cmd.exe 87 PID 3912 wrote to memory of 2604 3912 cmd.exe 87 PID 3912 wrote to memory of 2604 3912 cmd.exe 87 PID 4892 wrote to memory of 5100 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 91 PID 4892 wrote to memory of 5100 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 91 PID 4892 wrote to memory of 5100 4892 ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe 91 PID 5100 wrote to memory of 3100 5100 cmd.exe 93 PID 5100 wrote to memory of 3100 5100 cmd.exe 93 PID 5100 wrote to memory of 3100 5100 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe"C:\Users\Admin\AppData\Local\Temp\ef00f5ba9ff0e8af093f7dfd2fcc42328aef0c50a3148dd38a0c686cd8c0273b.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe3⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f2⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cacls.execacls "C:\system volume information" /e /g "Admin":f3⤵PID:3100
-
-