Analysis

  • max time kernel
    151s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 03:29

General

  • Target

    170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe

  • Size

    1.8MB

  • MD5

    2b870733548eaea03f7e2d0f3ce58fa7

  • SHA1

    dad121f1dedada13e16fd75650732e7d1917cb0b

  • SHA256

    170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32

  • SHA512

    f54052851488bd0b3b30aa1b10219a3df72837044df5d7beddb87fe69013feb2240047c6482f68ba38a6709a1b89c21369afb4dae00a4c4c9844b0759e48b166

  • SSDEEP

    49152:kwHUk15FDjRj9z2SzeH9T5gt24fFKwVuLdjOHlRxUIL:kw915hjRj96Sz6TrxGydqHDx3

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 45 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe
    "C:\Users\Admin\AppData\Local\Temp\170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Program Files (x86)\searchgoohs\googool.exe
      "C:\Program Files (x86)\searchgoohs\googool.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1696

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\searchgoohs\googool.exe
    Filesize

    1.2MB

    MD5

    f321a26a788b6a41a1f1a9bfdb7440b6

    SHA1

    72087b00f46fe41ad6190ccca5fcc506894c0bc2

    SHA256

    530540436c154dc5801519bcdb82ad5fd82fb1d58e9453c4a89262cb3d4e9009

    SHA512

    5123819a09a17fda6d56ad76311a80352013d2454a389ff009c9f1fec1ba88261ad64fd54da19f09b8409c1f2877d82b38640463a9476e699f5219c0c2d88bf9

  • \Program Files (x86)\searchgoohs\googool.exe
    Filesize

    1.2MB

    MD5

    f321a26a788b6a41a1f1a9bfdb7440b6

    SHA1

    72087b00f46fe41ad6190ccca5fcc506894c0bc2

    SHA256

    530540436c154dc5801519bcdb82ad5fd82fb1d58e9453c4a89262cb3d4e9009

    SHA512

    5123819a09a17fda6d56ad76311a80352013d2454a389ff009c9f1fec1ba88261ad64fd54da19f09b8409c1f2877d82b38640463a9476e699f5219c0c2d88bf9

  • \Program Files (x86)\searchgoohs\searchgoo.dll
    Filesize

    123KB

    MD5

    935d912d7d61c4e25169983f240d140b

    SHA1

    fd882392bf957395c512f74bf4823cb96ec3f0c5

    SHA256

    e0a2235595f5a364aa8c901e42c3c4059d4373af4c28d3b583e2d2cb906938fb

    SHA512

    01b2f729d19fcc4761143ef9d964a3fdbb4fb8af682efd932341beb6a62c5212f27171eb15690ac47fc655d62d393a2492c417299657cefb4fe8021b6f312cdc

  • memory/1696-57-0x0000000000000000-mapping.dmp
  • memory/1696-60-0x0000000000400000-0x00000000007F1000-memory.dmp
    Filesize

    3.9MB

  • memory/1696-61-0x0000000000400000-0x00000000007F1000-memory.dmp
    Filesize

    3.9MB

  • memory/1696-62-0x0000000000400000-0x00000000007F1000-memory.dmp
    Filesize

    3.9MB

  • memory/1696-63-0x0000000000400000-0x00000000007F1000-memory.dmp
    Filesize

    3.9MB

  • memory/1696-64-0x0000000000400000-0x00000000007F1000-memory.dmp
    Filesize

    3.9MB

  • memory/1696-65-0x0000000000400000-0x00000000007F1000-memory.dmp
    Filesize

    3.9MB

  • memory/1976-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp
    Filesize

    8KB