Analysis
-
max time kernel
158s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:59
Static task
static1
Behavioral task
behavioral1
Sample
222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe
Resource
win10v2004-20220901-en
General
-
Target
222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe
-
Size
4.2MB
-
MD5
133a1985c9245e363dc3f1e67f01c12e
-
SHA1
e63b1293244252dcc4cf45f54357c171407ded4b
-
SHA256
222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e
-
SHA512
b80df7e6db4850ae8b72ae4544c186bc7e42b49eff242ef2da6078a18f8c8660fa6a3a3714a357dd5f37f2b9c9bad5fa2c459d999f827de7fcdbf95ebcd14084
-
SSDEEP
98304:Zi1YKYTuBZMTNyi24y35v+RCBlsDxCrfetefq2BzdHoYK:fKYSITN24yJv+oBlMxC7etey2BWYK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
~GMB1F2.exe~GMB1F2.tmppid process 2028 ~GMB1F2.exe 760 ~GMB1F2.tmp -
Loads dropped DLL 4 IoCs
Processes:
222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe~GMB1F2.exe~GMB1F2.tmppid process 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe 2028 ~GMB1F2.exe 760 ~GMB1F2.tmp 760 ~GMB1F2.tmp -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
~GMB1F2.tmpdescription ioc process File opened (read-only) \??\G: ~GMB1F2.tmp File opened (read-only) \??\N: ~GMB1F2.tmp File opened (read-only) \??\O: ~GMB1F2.tmp File opened (read-only) \??\R: ~GMB1F2.tmp File opened (read-only) \??\E: ~GMB1F2.tmp File opened (read-only) \??\F: ~GMB1F2.tmp File opened (read-only) \??\Q: ~GMB1F2.tmp File opened (read-only) \??\W: ~GMB1F2.tmp File opened (read-only) \??\Z: ~GMB1F2.tmp File opened (read-only) \??\I: ~GMB1F2.tmp File opened (read-only) \??\P: ~GMB1F2.tmp File opened (read-only) \??\L: ~GMB1F2.tmp File opened (read-only) \??\M: ~GMB1F2.tmp File opened (read-only) \??\S: ~GMB1F2.tmp File opened (read-only) \??\H: ~GMB1F2.tmp File opened (read-only) \??\K: ~GMB1F2.tmp File opened (read-only) \??\U: ~GMB1F2.tmp File opened (read-only) \??\V: ~GMB1F2.tmp File opened (read-only) \??\X: ~GMB1F2.tmp File opened (read-only) \??\Y: ~GMB1F2.tmp File opened (read-only) \??\J: ~GMB1F2.tmp File opened (read-only) \??\T: ~GMB1F2.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
~GMB1F2.tmppid process 760 ~GMB1F2.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exedescription pid process Token: SeDebugPrivilege 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe~GMB1F2.exedescription pid process target process PID 1772 wrote to memory of 2028 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe ~GMB1F2.exe PID 1772 wrote to memory of 2028 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe ~GMB1F2.exe PID 1772 wrote to memory of 2028 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe ~GMB1F2.exe PID 1772 wrote to memory of 2028 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe ~GMB1F2.exe PID 1772 wrote to memory of 2028 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe ~GMB1F2.exe PID 1772 wrote to memory of 2028 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe ~GMB1F2.exe PID 1772 wrote to memory of 2028 1772 222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe ~GMB1F2.exe PID 2028 wrote to memory of 760 2028 ~GMB1F2.exe ~GMB1F2.tmp PID 2028 wrote to memory of 760 2028 ~GMB1F2.exe ~GMB1F2.tmp PID 2028 wrote to memory of 760 2028 ~GMB1F2.exe ~GMB1F2.tmp PID 2028 wrote to memory of 760 2028 ~GMB1F2.exe ~GMB1F2.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe"C:\Users\Admin\AppData\Local\Temp\222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe"C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\is-IOR2H.tmp\~GMB1F2.tmp"C:\Users\Admin\AppData\Local\Temp\is-IOR2H.tmp\~GMB1F2.tmp" /SL5="$60154,3751313,57344,C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
PID:760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
703KB
MD58c79eb6b5599344f83dd05c96fbdbe3d
SHA16bac86cdd25e0b4fd5885d0f74d2029a7c7b70bc
SHA25689b4d61fa1ab4b2ff5b8db0f1bd4845eaf33bcf9fea91760bc36514f85f452e3
SHA5126667703686f01b74230a5b70ca26b1b15d043551d4abb812f3df03914f97a196b1fd32d118807e56bb1c95c0f85e81bde147290429df1dea7e0bffca5b4292aa
-
Filesize
3.9MB
MD51de5b2abbd68ccbae15b6fb2263544c5
SHA1154457df6d678894cfe273a5d2576ba1673c0da5
SHA25666c564575b31e9f9a736535a06d678711c713dbe3b53fa1d4f892c4152a5b77e
SHA512cc649d182a30aeeb4006f41f9df4ac5ed888bde317126ac25444f7eb4c2a2b2050b6f05e4be31849f95b816fec62d002bc5a6fc1e803fa254cf622d635bc13cc
-
Filesize
3.9MB
MD51de5b2abbd68ccbae15b6fb2263544c5
SHA1154457df6d678894cfe273a5d2576ba1673c0da5
SHA25666c564575b31e9f9a736535a06d678711c713dbe3b53fa1d4f892c4152a5b77e
SHA512cc649d182a30aeeb4006f41f9df4ac5ed888bde317126ac25444f7eb4c2a2b2050b6f05e4be31849f95b816fec62d002bc5a6fc1e803fa254cf622d635bc13cc
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
703KB
MD58c79eb6b5599344f83dd05c96fbdbe3d
SHA16bac86cdd25e0b4fd5885d0f74d2029a7c7b70bc
SHA25689b4d61fa1ab4b2ff5b8db0f1bd4845eaf33bcf9fea91760bc36514f85f452e3
SHA5126667703686f01b74230a5b70ca26b1b15d043551d4abb812f3df03914f97a196b1fd32d118807e56bb1c95c0f85e81bde147290429df1dea7e0bffca5b4292aa
-
Filesize
3.9MB
MD51de5b2abbd68ccbae15b6fb2263544c5
SHA1154457df6d678894cfe273a5d2576ba1673c0da5
SHA25666c564575b31e9f9a736535a06d678711c713dbe3b53fa1d4f892c4152a5b77e
SHA512cc649d182a30aeeb4006f41f9df4ac5ed888bde317126ac25444f7eb4c2a2b2050b6f05e4be31849f95b816fec62d002bc5a6fc1e803fa254cf622d635bc13cc