Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:21

General

  • Target

    68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe

  • Size

    172KB

  • MD5

    43766670e31e2167903d6506d954d9d1

  • SHA1

    27a2cd4dd63d8a9f4cee5f0d9f1943ff92e1e33a

  • SHA256

    68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48

  • SHA512

    0ef9cbf4e204b61a879d49231a323c64b44412b8e7c5ac835cc3bc21ddad07a8de3d03d5e118c69013a23c6fea3fed6297a6b9a96806aefe346549738651dcab

  • SSDEEP

    3072:MKCqVcS+4xLKGPQb6pLnq1AbpaMAePjT9273c0IyXTzTon8:TVxLKGPQbWqliF27MuHT/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe
    "C:\Users\Admin\AppData\Local\Temp\68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\godom.exe
      "C:\Users\Admin\godom.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1832

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\godom.exe
    Filesize

    172KB

    MD5

    af7c37eab87c994ed6922d33c07e1a5d

    SHA1

    5e6ace614d2b36f738f328d62b15557ddb58828e

    SHA256

    c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57

    SHA512

    a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3

  • C:\Users\Admin\godom.exe
    Filesize

    172KB

    MD5

    af7c37eab87c994ed6922d33c07e1a5d

    SHA1

    5e6ace614d2b36f738f328d62b15557ddb58828e

    SHA256

    c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57

    SHA512

    a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3

  • \Users\Admin\godom.exe
    Filesize

    172KB

    MD5

    af7c37eab87c994ed6922d33c07e1a5d

    SHA1

    5e6ace614d2b36f738f328d62b15557ddb58828e

    SHA256

    c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57

    SHA512

    a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3

  • \Users\Admin\godom.exe
    Filesize

    172KB

    MD5

    af7c37eab87c994ed6922d33c07e1a5d

    SHA1

    5e6ace614d2b36f738f328d62b15557ddb58828e

    SHA256

    c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57

    SHA512

    a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3

  • memory/1104-70-0x0000000002AF0000-0x0000000002B1C000-memory.dmp
    Filesize

    176KB

  • memory/1104-57-0x0000000075BB1000-0x0000000075BB3000-memory.dmp
    Filesize

    8KB

  • memory/1104-56-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1104-65-0x0000000002AF0000-0x0000000002B1C000-memory.dmp
    Filesize

    176KB

  • memory/1104-66-0x0000000002AF0000-0x0000000002B1C000-memory.dmp
    Filesize

    176KB

  • memory/1104-71-0x0000000002AF0000-0x0000000002B1C000-memory.dmp
    Filesize

    176KB

  • memory/1104-69-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1832-60-0x0000000000000000-mapping.dmp
  • memory/1832-67-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1832-72-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB