Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe
Resource
win10v2004-20220901-en
General
-
Target
a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe
-
Size
212KB
-
MD5
0ea9d705fa2d18453824a26a40d49022
-
SHA1
20a0309d06b6a3992c9f9f298b50e9df14a2c43b
-
SHA256
a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1
-
SHA512
9520678c0a45d43c8e880ccb09615f70e1313be9c6d375981bd8e92a7a934fc20438ded5331eaba6c4459b0589a26de97e951134626c5f8cabf64ccec48e12ad
-
SSDEEP
6144:iXAKwwP0iczY09umHh7K5cUXEBwrYVHhAgY65cJ:IAby0xY09umH45cUXEBwUVHhAgY65u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giixe.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 giixe.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /a" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /a" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /b" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /h" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /p" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /m" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /f" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /o" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /h" giixe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /z" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /w" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /w" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /g" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /o" giixe.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /m" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /e" a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /z" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /v" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /q" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /l" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /j" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /x" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /c" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /r" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /i" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /n" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /d" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /t" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /x" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /v" giixe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /l" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /q" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /j" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /i" giixe.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /e" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /s" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /u" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /d" a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /u" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /t" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /k" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /c" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /y" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /p" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /f" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /d" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /e" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /g" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /s" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /b" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /k" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /y" giixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /r" giixe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\giixe = "C:\\Users\\Admin\\giixe.exe /n" giixe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5060 a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe 5060 a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe 2976 giixe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 giixe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5060 a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe 2976 giixe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 2976 5060 a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe 82 PID 5060 wrote to memory of 2976 5060 a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe 82 PID 5060 wrote to memory of 2976 5060 a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe"C:\Users\Admin\AppData\Local\Temp\a35d82fe42736b4dfdcc91094f48590b83135db2bb6eac196038c6f13e9403f1.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\giixe.exe"C:\Users\Admin\giixe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD59b7ae60543c3f24173cb967cb49f5b0c
SHA1be51d2ee24fae27b2067682376d256aa24c697ab
SHA25692fa16c9b701c919139b07f9d4888cd4d6c1b7a3e67c59c3e4125c04f9139ee1
SHA512912cd661d44b6a165fabddadf202899c97c0591cf597ea2afed2b911c954bc15e2d6f3629a3d3a3a13ae98a428f357ebf9f496d26ce51b3178d6e9d86156d66f
-
Filesize
212KB
MD59b7ae60543c3f24173cb967cb49f5b0c
SHA1be51d2ee24fae27b2067682376d256aa24c697ab
SHA25692fa16c9b701c919139b07f9d4888cd4d6c1b7a3e67c59c3e4125c04f9139ee1
SHA512912cd661d44b6a165fabddadf202899c97c0591cf597ea2afed2b911c954bc15e2d6f3629a3d3a3a13ae98a428f357ebf9f496d26ce51b3178d6e9d86156d66f