Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe
Resource
win10v2004-20221111-en
General
-
Target
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe
-
Size
172KB
-
MD5
43766670e31e2167903d6506d954d9d1
-
SHA1
27a2cd4dd63d8a9f4cee5f0d9f1943ff92e1e33a
-
SHA256
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48
-
SHA512
0ef9cbf4e204b61a879d49231a323c64b44412b8e7c5ac835cc3bc21ddad07a8de3d03d5e118c69013a23c6fea3fed6297a6b9a96806aefe346549738651dcab
-
SSDEEP
3072:MKCqVcS+4xLKGPQb6pLnq1AbpaMAePjT9273c0IyXTzTon8:TVxLKGPQbWqliF27MuHT/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exegodom.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" godom.exe -
Executes dropped EXE 1 IoCs
Processes:
godom.exepid process 1832 godom.exe -
Loads dropped DLL 2 IoCs
Processes:
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exepid process 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
godom.exe68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /i" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /d" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /o" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /j" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /t" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /e" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /b" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /r" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /v" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /m" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /w" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /l" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /z" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /f" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /y" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /p" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /k" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /a" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /u" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /h" godom.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /x" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /n" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /q" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /g" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /s" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /c" godom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\godom = "C:\\Users\\Admin\\godom.exe /x" 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ godom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exegodom.exepid process 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe 1832 godom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exegodom.exepid process 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe 1832 godom.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exedescription pid process target process PID 1104 wrote to memory of 1832 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe godom.exe PID 1104 wrote to memory of 1832 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe godom.exe PID 1104 wrote to memory of 1832 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe godom.exe PID 1104 wrote to memory of 1832 1104 68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe godom.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe"C:\Users\Admin\AppData\Local\Temp\68b90b809986ca1706ee11fbf4c7609fdfe356eb236d98c222a5cc25aeab7d48.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\godom.exe"C:\Users\Admin\godom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5af7c37eab87c994ed6922d33c07e1a5d
SHA15e6ace614d2b36f738f328d62b15557ddb58828e
SHA256c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57
SHA512a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3
-
Filesize
172KB
MD5af7c37eab87c994ed6922d33c07e1a5d
SHA15e6ace614d2b36f738f328d62b15557ddb58828e
SHA256c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57
SHA512a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3
-
Filesize
172KB
MD5af7c37eab87c994ed6922d33c07e1a5d
SHA15e6ace614d2b36f738f328d62b15557ddb58828e
SHA256c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57
SHA512a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3
-
Filesize
172KB
MD5af7c37eab87c994ed6922d33c07e1a5d
SHA15e6ace614d2b36f738f328d62b15557ddb58828e
SHA256c93fecb2e9ff8780fafba61bfe8d1c23da5783c7d995dd12dd351df3fb021b57
SHA512a1e18000e0426eb3e27d3097617fea8857d0d29d14b6d19d6584fbfc43b9c30687a7e9ccfe874bda8d1306137277dd93d7c5739a5d79229ace9510c8fecc64b3