Overview
overview
3Static
static
gonb1723/C....class
windows7-x64
3gonb1723/C....class
windows10-2004-x64
3gonb1723/C....class
windows7-x64
3gonb1723/C....class
windows10-2004-x64
3gonb1723/G....class
windows7-x64
3gonb1723/G....class
windows10-2004-x64
3gonb1723/P....class
windows7-x64
3gonb1723/P....class
windows10-2004-x64
3gonb1723/P....class
windows7-x64
3gonb1723/P....class
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
gonb1723/Confuser.class
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
gonb1723/Confuser.class
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
gonb1723/ConfusingClassLoader.class
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
gonb1723/ConfusingClassLoader.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
gonb1723/Gondattack.class
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
gonb1723/Gondattack.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
gonb1723/PayloadX$StreamConnector.class
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
gonb1723/PayloadX$StreamConnector.class
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
gonb1723/PayloadX.class
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
gonb1723/PayloadX.class
Resource
win10v2004-20220812-en
General
-
Target
gonb1723/Gondattack.class
-
Size
2KB
-
MD5
e86d530c2a9733ab6f0c79aed8061894
-
SHA1
fd74f01a665155b2a73440fa20981e733040e1e0
-
SHA256
34f93802f3d7825d46b39593dc3f10d3fd4709d2c5bf9eaf6f7b479182086cd4
-
SHA512
99d6346ecdb4687ad4d495785addcfaa7a722ad40b2eaa31be6f3f5fffd01b11e74d63a8728364ae25c2efe14796e76311feaf5792a3e051352ac52b0200baf3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\class_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\class_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.class rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\class_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.class\ = "class_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\class_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\class_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\class_auto_file rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 380 AcroRd32.exe 380 AcroRd32.exe 380 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1984 1492 cmd.exe 27 PID 1492 wrote to memory of 1984 1492 cmd.exe 27 PID 1492 wrote to memory of 1984 1492 cmd.exe 27 PID 1984 wrote to memory of 380 1984 rundll32.exe 28 PID 1984 wrote to memory of 380 1984 rundll32.exe 28 PID 1984 wrote to memory of 380 1984 rundll32.exe 28 PID 1984 wrote to memory of 380 1984 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gonb1723\Gondattack.class1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gonb1723\Gondattack.class2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\gonb1723\Gondattack.class"3⤵
- Suspicious use of SetWindowsHookEx
PID:380
-
-