Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:33
Static task
static1
Behavioral task
behavioral1
Sample
.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
.exe
Resource
win10v2004-20220901-en
General
-
Target
.exe
-
Size
325KB
-
MD5
632815f4f93a1e88dd062c0a75b2ebda
-
SHA1
1aae28c24d933827985786bb79074a673eb77546
-
SHA256
002afb2d4477706349ddac2f2f75437d83ab530fff16502482b20cf70ab5fc01
-
SHA512
a6bb05a6f1284a05fdad1437656aeadafadc2c0cd30ccdb5eff88f133542eb129234f88d40cf476c6fe040868c4e32db217980d36329d0c4b1e4a8b5fdd9674e
-
SSDEEP
6144:yZXBsWqsE/Ao+mv8Qv0LVmwq4FU0nN876safCSQSCyd0oGOUdFPI4l5XdhSJ0:0XmwRo+mv8QD4+0N46lf1wyd0SUrvHzL
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 13 1204 WScript.exe 19 1204 WScript.exe -
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
crypt.execrypt.exepid process 1884 crypt.exe 1384 crypt.exe -
Loads dropped DLL 2 IoCs
Processes:
.execrypt.exepid process 2024 .exe 1884 crypt.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 104.219.53.112 Destination IP 104.219.53.112 -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run .exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Gorn = "C:\\Program Files (x86)\\Gorn\\Gorn\\crypt.exe" .exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
crypt.exedescription pid process target process PID 1884 set thread context of 1384 1884 crypt.exe crypt.exe -
Drops file in Program Files directory 8 IoCs
Processes:
.exedescription ioc process File opened for modification C:\Program Files (x86)\Gorn\Gorn\Uninstall.exe .exe File created C:\Program Files (x86)\Gorn\Gorn\Uninstall.ini .exe File opened for modification C:\Program Files (x86)\Gorn\Gorn\neznoesvidanie.vbs .exe File opened for modification C:\Program Files (x86)\Gorn\Gorn\prostoigra.bat .exe File opened for modification C:\Program Files (x86)\Gorn\Gorn\2.txt .exe File opened for modification C:\Program Files (x86)\Gorn\Gorn\1.txt .exe File opened for modification C:\Program Files (x86)\Gorn\Gorn\crypt.exe .exe File opened for modification C:\Program Files (x86)\Gorn\Gorn\dns_bablo.vbs .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
Processes:
resource yara_rule \Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_1 \Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_2 C:\Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_1 C:\Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_2 C:\Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_1 C:\Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_2 C:\Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_1 C:\Program Files (x86)\Gorn\Gorn\crypt.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
.execrypt.exedescription pid process target process PID 2024 wrote to memory of 1680 2024 .exe cmd.exe PID 2024 wrote to memory of 1680 2024 .exe cmd.exe PID 2024 wrote to memory of 1680 2024 .exe cmd.exe PID 2024 wrote to memory of 1680 2024 .exe cmd.exe PID 2024 wrote to memory of 1204 2024 .exe WScript.exe PID 2024 wrote to memory of 1204 2024 .exe WScript.exe PID 2024 wrote to memory of 1204 2024 .exe WScript.exe PID 2024 wrote to memory of 1204 2024 .exe WScript.exe PID 2024 wrote to memory of 1884 2024 .exe crypt.exe PID 2024 wrote to memory of 1884 2024 .exe crypt.exe PID 2024 wrote to memory of 1884 2024 .exe crypt.exe PID 2024 wrote to memory of 1884 2024 .exe crypt.exe PID 2024 wrote to memory of 456 2024 .exe WScript.exe PID 2024 wrote to memory of 456 2024 .exe WScript.exe PID 2024 wrote to memory of 456 2024 .exe WScript.exe PID 2024 wrote to memory of 456 2024 .exe WScript.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe PID 1884 wrote to memory of 1384 1884 crypt.exe crypt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Gorn\Gorn\prostoigra.bat" "2⤵
- Drops file in Drivers directory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Gorn\Gorn\neznoesvidanie.vbs"2⤵
- Blocklisted process makes network request
-
C:\Program Files (x86)\Gorn\Gorn\crypt.exe"C:\Program Files (x86)\Gorn\Gorn\crypt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Gorn\Gorn\crypt.exe"C:\Program Files (x86)\Gorn\Gorn\crypt.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Gorn\Gorn\dns_bablo.vbs"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Gorn\Gorn\1.txtFilesize
16B
MD53a26a67ff49cfa2b84e33228fdff96e2
SHA11f8920d5876bb24722239fccc326ab615eb8a9f6
SHA2564a024516bd3c52b19f238e652858c41e30ac917033a4ed6a09bc844870801ad9
SHA512b7010dd1d96b82103856f7658025fd565970e1c162ba7396eb1a7455db377e29544943ef13c6cb6b057d1b29f02d2d88e4919216f5df2e0e3ac96b02f5f96763
-
C:\Program Files (x86)\Gorn\Gorn\2.txtFilesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
C:\Program Files (x86)\Gorn\Gorn\crypt.exeFilesize
96KB
MD53a8325ed380fc84c9904dbb69648f027
SHA1cdfad9f6c4da4e18cf4642914bf9a240b24e201c
SHA2562202a050f5ed24bc79b12258b13628e18f452607e2d6e36ef5d29af3d263d2cc
SHA5123feb1573968842819a931164bf08b313cc9ae58044cd0321cd7c8302d6c6ff52b59e6d7f38997d35fadbd31e73531716237e56633cef08fc87ed810771665a5b
-
C:\Program Files (x86)\Gorn\Gorn\crypt.exeFilesize
96KB
MD53a8325ed380fc84c9904dbb69648f027
SHA1cdfad9f6c4da4e18cf4642914bf9a240b24e201c
SHA2562202a050f5ed24bc79b12258b13628e18f452607e2d6e36ef5d29af3d263d2cc
SHA5123feb1573968842819a931164bf08b313cc9ae58044cd0321cd7c8302d6c6ff52b59e6d7f38997d35fadbd31e73531716237e56633cef08fc87ed810771665a5b
-
C:\Program Files (x86)\Gorn\Gorn\crypt.exeFilesize
96KB
MD53a8325ed380fc84c9904dbb69648f027
SHA1cdfad9f6c4da4e18cf4642914bf9a240b24e201c
SHA2562202a050f5ed24bc79b12258b13628e18f452607e2d6e36ef5d29af3d263d2cc
SHA5123feb1573968842819a931164bf08b313cc9ae58044cd0321cd7c8302d6c6ff52b59e6d7f38997d35fadbd31e73531716237e56633cef08fc87ed810771665a5b
-
C:\Program Files (x86)\Gorn\Gorn\dns_bablo.vbsFilesize
820B
MD5a6a354ab320e9f261634544ac79c1303
SHA1a596fff074a1f4e3500de8bd13431f59b7affa26
SHA256bba00f7a29d69e07a511a0c22900a49474277f2f60e888652c22edf05d058adb
SHA512a0a1f2d487fa1421310c5696e477421c0394eae226bb3926d6f67961c2fe67893f324bb2f658f31473d9c98357c37c740e480cd4f7b1a28f60f66a190dda6c3f
-
C:\Program Files (x86)\Gorn\Gorn\neznoesvidanie.vbsFilesize
304B
MD5d1661e92f33f991c9b39cbdd87e09eb2
SHA169a8be30c87670883071bc0433a14b5684cd4eb9
SHA25632d63fcbfe75b5fd2ef99c8ef81e5c1192659c51632fdc31042b9e70ff837d34
SHA51257e7ca904741ea3b9f14695ae94d8f7a6561c36f5da486bb390bed3c177d7dd8165927ab4d8c7b89ffc4bd8af8fbb2b4aeb3cac35be91543ffe63fb64ef2dc25
-
C:\Program Files (x86)\Gorn\Gorn\prostoigra.batFilesize
1KB
MD580add2b40d0cee2e7c84dfdb9366d557
SHA1d980810f0cacfc964e6c09df5c5fe981f0c68c88
SHA25681a6609fb691be373f24e7b6dd416436cfe311daff37f69d0ee2320dfe3d3593
SHA51234402823b51f17d0a414b86f9201b860e38197dd1d4f660382891d321ad67f283b600722e29d0c81b3a9c2a30931d1be1da184647475bef2a35c1ab7b02b2b15
-
\Program Files (x86)\Gorn\Gorn\crypt.exeFilesize
96KB
MD53a8325ed380fc84c9904dbb69648f027
SHA1cdfad9f6c4da4e18cf4642914bf9a240b24e201c
SHA2562202a050f5ed24bc79b12258b13628e18f452607e2d6e36ef5d29af3d263d2cc
SHA5123feb1573968842819a931164bf08b313cc9ae58044cd0321cd7c8302d6c6ff52b59e6d7f38997d35fadbd31e73531716237e56633cef08fc87ed810771665a5b
-
\Users\Admin\AppData\Local\Temp\nsj20CC.tmp\setters.dllFilesize
64KB
MD5a32646c77d7c86b39b509ad76e1f3964
SHA1143a1a49259c933fe6c2d1644b87729637db6ea1
SHA256e6cb15079157e3ff3eb899a51bce0331fae5c1346e8dc0836adab34001047d0d
SHA5122d7e73a9719a5b5ee46a1432f25cb8436808dbbf352e7b6c25d9bef5d5fb92bfabab858571efd7a02b0e9966f275f6f037a91a48d0aa995cc13ee0fef0ff07ae
-
memory/456-64-0x0000000000000000-mapping.dmp
-
memory/1204-59-0x0000000000000000-mapping.dmp
-
memory/1384-76-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-78-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-71-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-72-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-74-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-86-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-77-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-85-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-79-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-80-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-81-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1384-82-0x00000000004012A0-mapping.dmp
-
memory/1680-55-0x0000000000000000-mapping.dmp
-
memory/1884-61-0x0000000000000000-mapping.dmp
-
memory/2024-54-0x00000000766D1000-0x00000000766D3000-memory.dmpFilesize
8KB