Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe
Resource
win10v2004-20220812-en
General
-
Target
c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe
-
Size
1.9MB
-
MD5
90d63f01ac77504bb55cbfd72e8ba186
-
SHA1
f70b569e9c29684b36e4241f36b463f9d6aa03a2
-
SHA256
c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814
-
SHA512
5b855c8ab7438b703cb21146318ef6f0fbe0b408d74eff287e003a90c072e924cc1af2ca7cc9623fbc38df72db4ab8c84aa8cd6094845d4fdb30c8cec3a47b54
-
SSDEEP
49152:GwHv9lt/SgRIpVQIIFJxGfVSDiQAU4KzPZTm19Gkt/:GwVlxSgRUKhGfApAUPz1mzGkt/
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0006000000022e7c-137.dat aspack_v212_v242 behavioral2/files/0x0006000000022e7c-138.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 1368 searchgoosginst.exe 2748 serkle.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation searchgoosginst.exe -
Loads dropped DLL 1 IoCs
pid Process 1368 searchgoosginst.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run searchgoosginst.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\searchgoosg = "C:\\Program Files (x86)\\searchgoosg\\serkle.exe" searchgoosginst.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F85CACCB-E910-43D2-8C18-75EA1295196F} searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F85CACCB-E910-43D2-8C18-75EA1295196F}\ searchgoosginst.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\searchgoosginst.exe c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe File opened for modification C:\Windows\SysWOW64\VB6KO.DLL searchgoosginst.exe File opened for modification C:\Windows\SysWOW64\MSINET.OCX searchgoosginst.exe File opened for modification C:\Windows\SysWOW64\INETKO.DLL searchgoosginst.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\searchgoosg\searchgoosgdl.exe searchgoosginst.exe File opened for modification C:\Program Files (x86)\searchgoosg\serkle.exe searchgoosginst.exe File opened for modification C:\Program Files (x86)\searchgoosg\Uninstall.exe searchgoosginst.exe File created C:\Program Files (x86)\searchgoosg\Uninstall.ini searchgoosginst.exe File opened for modification C:\Program Files (x86)\searchgoosg\searchgoosg.dll searchgoosginst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\FLAGS\ = "0" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\0\win32 searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ = "_searchgoosg" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\ProgID searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151} searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\0\win32\ = "C:\\Program Files (x86)\\searchgoosg\\searchgoosg.dll" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\ProgID\ = "searchgoosgpg.searchgoosg" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\InprocServer32\ = "C:\\Program Files (x86)\\searchgoosg\\searchgoosg.dll" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoosgpg.searchgoosg\Clsid searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0 searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\HELPDIR\ = "C:\\Program Files (x86)\\searchgoosg" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\TypeLib\ = "{764B25C4-3744-4625-B33A-E471E2374151}" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ = "searchgoosg" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\Programmable searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\ = "searchgoosgpg" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6} searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ProxyStubClsid32 searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ProxyStubClsid32 searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoosgpg.searchgoosg searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\TypeLib\Version = "3.0" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\TypeLib\Version = "3.0" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\VERSION searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\TypeLib searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\ = "searchgoosgpg.searchgoosg" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\InprocServer32 searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ProxyStubClsid searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\ = "_searchgoosg" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\TypeLib\ = "{764B25C4-3744-4625-B33A-E471E2374151}" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6} searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F} searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\InprocServer32\ThreadingModel = "Apartment" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\TypeLib searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\VERSION\ = "3.0" searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F85CACCB-E910-43D2-8C18-75EA1295196F}\Implemented Categories searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\FLAGS searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\0 searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{764B25C4-3744-4625-B33A-E471E2374151}\3.0\HELPDIR searchgoosginst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\TypeLib searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66A85F2F-A5D3-442A-85E4-3B901CF2B4C6}\TypeLib\ = "{764B25C4-3744-4625-B33A-E471E2374151}" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoosgpg.searchgoosg\ = "searchgoosgpg.searchgoosg" searchgoosginst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoosgpg.searchgoosg\Clsid\ = "{F85CACCB-E910-43D2-8C18-75EA1295196F}" searchgoosginst.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2748 serkle.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1368 4772 c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe 82 PID 4772 wrote to memory of 1368 4772 c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe 82 PID 4772 wrote to memory of 1368 4772 c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe 82 PID 1368 wrote to memory of 2748 1368 searchgoosginst.exe 83 PID 1368 wrote to memory of 2748 1368 searchgoosginst.exe 83 PID 1368 wrote to memory of 2748 1368 searchgoosginst.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe"C:\Users\Admin\AppData\Local\Temp\c1157c96d3f91dd1c71b6d3572a63ef6da2eec0981a8a54f36487f24e9421814.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\searchgoosginst.exeC:\Windows\system32\searchgoosginst.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\searchgoosg\serkle.exe"C:\Program Files (x86)\searchgoosg\serkle.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5e8b4bf324251922a7fb629a140b214b2
SHA1419a66e8841d4fc1bd15b0a95c9afb778e54566b
SHA256ad6bca5dd0092942fc7bf6020a40fe5e68f826ea9599d21225b1159532ca7114
SHA5123604352022fad3fe92975205221a91a85be1a8184fb244f57ecb52a1b5611fb353e156522411d812f500058d57793903b81e22cc8bd504ffd9646ebaff46f79d
-
Filesize
1.2MB
MD5c0d559d1d7b5607179f142b53bb11c79
SHA15f059c4fbbe790f1e54c4ac53353b07e41854c59
SHA256b8d8d0f5752d070607d695a1196f0e38e7991f34c83cdb6858b9c4f075a06184
SHA512a85989ad9560166ff1ffbd73bc3b0515c93ead1350c588c72739d06642ea79b3677cf06b1e2f6f545657c4d7a4fa4d47a988dfd3980611a7b853f4c44c478f67
-
Filesize
1.2MB
MD5c0d559d1d7b5607179f142b53bb11c79
SHA15f059c4fbbe790f1e54c4ac53353b07e41854c59
SHA256b8d8d0f5752d070607d695a1196f0e38e7991f34c83cdb6858b9c4f075a06184
SHA512a85989ad9560166ff1ffbd73bc3b0515c93ead1350c588c72739d06642ea79b3677cf06b1e2f6f545657c4d7a4fa4d47a988dfd3980611a7b853f4c44c478f67
-
Filesize
1.8MB
MD56fb4ee2d4197eb0a9d36108569a01219
SHA174f516d60430f187dbadc77327ac5f3a34423f01
SHA256f5f48954e71b613b69eabf2cba550c7ada448fbb49d353d00f25e000559d7253
SHA512f580c9d9e8c57b92dec34bc43c6c9002d5dd1c504797b4bbbf00467c3e4af07053c1a0e5f5918ad02495b4e6e1f16b3e8b9c4fc05b3bf1caa5481f9ec3b26407
-
Filesize
1.8MB
MD56fb4ee2d4197eb0a9d36108569a01219
SHA174f516d60430f187dbadc77327ac5f3a34423f01
SHA256f5f48954e71b613b69eabf2cba550c7ada448fbb49d353d00f25e000559d7253
SHA512f580c9d9e8c57b92dec34bc43c6c9002d5dd1c504797b4bbbf00467c3e4af07053c1a0e5f5918ad02495b4e6e1f16b3e8b9c4fc05b3bf1caa5481f9ec3b26407