Analysis

  • max time kernel
    143s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 08:59

General

  • Target

    c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe

  • Size

    45KB

  • MD5

    3e70d9a82e68af43f27dbde3a7492490

  • SHA1

    4e46ebea70e6fbecdba8d274daeb43f9b9bdf9f3

  • SHA256

    c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198

  • SHA512

    5e0aed6c743535aba1470149da064f9a9cd18d57202479cc552181687969fd2949a438f74358a0ac63c053ef7fdb6c38040660cfbd078f73ac6ac07e89e9c1b6

  • SSDEEP

    768:XZwb9TV5ZDzu83AqN1LZNneGcRnks/iaeS9rmJIga9/U/1H5:XZwb9TvZ3wqnL67RnkMVmeq

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe
    "C:\Users\Admin\AppData\Local\Temp\c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\Gbmqkm32.exe
      C:\Windows\system32\Gbmqkm32.exe
      2⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1940

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Gbmqkm32.exe
    Filesize

    45KB

    MD5

    27adae0e6d1afa6486ccf76472d385f7

    SHA1

    43ca9be623bf125311669f5b26cf4e1596af4313

    SHA256

    6989f7207253208d93763281e91ce9d74f8a1b0163f80dcbd6cb0069f0c91f8c

    SHA512

    2465107d16ac40afb7aeedf48172a0d80bdc4377d1bca4d246920a8f461d0556c5f852d40cebc47d3bc3dd85ae49c8f4adbafe083c89e8026432ab6a2b96f64c

  • \Windows\SysWOW64\Gbmqkm32.exe
    Filesize

    45KB

    MD5

    27adae0e6d1afa6486ccf76472d385f7

    SHA1

    43ca9be623bf125311669f5b26cf4e1596af4313

    SHA256

    6989f7207253208d93763281e91ce9d74f8a1b0163f80dcbd6cb0069f0c91f8c

    SHA512

    2465107d16ac40afb7aeedf48172a0d80bdc4377d1bca4d246920a8f461d0556c5f852d40cebc47d3bc3dd85ae49c8f4adbafe083c89e8026432ab6a2b96f64c

  • \Windows\SysWOW64\Gbmqkm32.exe
    Filesize

    45KB

    MD5

    27adae0e6d1afa6486ccf76472d385f7

    SHA1

    43ca9be623bf125311669f5b26cf4e1596af4313

    SHA256

    6989f7207253208d93763281e91ce9d74f8a1b0163f80dcbd6cb0069f0c91f8c

    SHA512

    2465107d16ac40afb7aeedf48172a0d80bdc4377d1bca4d246920a8f461d0556c5f852d40cebc47d3bc3dd85ae49c8f4adbafe083c89e8026432ab6a2b96f64c

  • memory/1760-59-0x0000000000430000-0x000000000045F000-memory.dmp
    Filesize

    188KB

  • memory/1760-58-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1940-56-0x0000000000000000-mapping.dmp
  • memory/1940-60-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1940-61-0x0000000076181000-0x0000000076183000-memory.dmp
    Filesize

    8KB

  • memory/1940-62-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB