Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 03:29
Static task
static1
Behavioral task
behavioral1
Sample
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe
Resource
win10v2004-20220812-en
General
-
Target
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe
-
Size
1.8MB
-
MD5
2b870733548eaea03f7e2d0f3ce58fa7
-
SHA1
dad121f1dedada13e16fd75650732e7d1917cb0b
-
SHA256
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32
-
SHA512
f54052851488bd0b3b30aa1b10219a3df72837044df5d7beddb87fe69013feb2240047c6482f68ba38a6709a1b89c21369afb4dae00a4c4c9844b0759e48b166
-
SSDEEP
49152:kwHUk15FDjRj9z2SzeH9T5gt24fFKwVuLdjOHlRxUIL:kw915hjRj96Sz6TrxGydqHDx3
Malware Config
Signatures
-
Processes:
resource yara_rule \Program Files (x86)\searchgoohs\googool.exe aspack_v212_v242 C:\Program Files (x86)\searchgoohs\googool.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
googool.exepid process 1696 googool.exe -
Loads dropped DLL 2 IoCs
Processes:
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exepid process 1976 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe 1976 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\searchgoo = "C:\\Program Files (x86)\\searchgoohs\\googool.exe" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528} 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\ 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe -
Drops file in System32 directory 3 IoCs
Processes:
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\INETKO.DLL 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe File opened for modification C:\Windows\SysWOW64\MSINET.OCX 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe File opened for modification C:\Windows\SysWOW64\VB6KO.DLL 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe -
Drops file in Program Files directory 5 IoCs
Processes:
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exedescription ioc process File opened for modification C:\Program Files (x86)\searchgoohs\searchgoo.dll 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe File opened for modification C:\Program Files (x86)\searchgoohs\searchfree.exe 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe File opened for modification C:\Program Files (x86)\searchgoohs\googool.exe 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe File opened for modification C:\Program Files (x86)\searchgoohs\Uninstall.exe 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe File created C:\Program Files (x86)\searchgoohs\Uninstall.ini 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 45 IoCs
Processes:
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1} 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1} 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\InprocServer32\ = "C:\\Program Files (x86)\\searchgoohs\\searchgoo.dll" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\VERSION\ = "8.0" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ProxyStubClsid 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\Implemented Categories 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322} 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ProxyStubClsid32 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\InprocServer32\ThreadingModel = "Apartment" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\Programmable 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\ = "searchgoopg" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\0 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\TypeLib\ = "{1701336A-D596-4035-9CC3-32B790CA1322}" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\TypeLib\Version = "8.0" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\TypeLib 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoopg.searchgoo\Clsid\ = "{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\FLAGS\ = "0" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\0\win32\ = "C:\\Program Files (x86)\\searchgoohs\\searchgoo.dll" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\HELPDIR 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ = "_searchgoo" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\TypeLib\ = "{1701336A-D596-4035-9CC3-32B790CA1322}" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\TypeLib\ = "{1701336A-D596-4035-9CC3-32B790CA1322}" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ = "_searchgoo" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\0\win32 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\TypeLib\Version = "8.0" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoopg.searchgoo\ = "searchgoopg.searchgoo" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoopg.searchgoo\Clsid 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ = "searchgoo" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\FLAGS 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{1701336A-D596-4035-9CC3-32B790CA1322}\8.0\HELPDIR\ = "C:\\Program Files (x86)\\searchgoohs" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528} 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\ProgID\ = "searchgoopg.searchgoo" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\searchgoopg.searchgoo 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\VERSION 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\ProxyStubClsid32 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\TypeLib 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A14035D-DC52-4744-A373-892EE962A5B1}\TypeLib 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\ = "searchgoopg.searchgoo" 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\ProgID 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E1D5F701-9E1A-4DA9-B190-1E8BDA7EB528}\InprocServer32 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
googool.exepid process 1696 googool.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exedescription pid process target process PID 1976 wrote to memory of 1696 1976 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe googool.exe PID 1976 wrote to memory of 1696 1976 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe googool.exe PID 1976 wrote to memory of 1696 1976 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe googool.exe PID 1976 wrote to memory of 1696 1976 170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe googool.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe"C:\Users\Admin\AppData\Local\Temp\170d4862a2fa7c87d0548ea061807e6f44dca531a24b94b9ee406c856041ae32.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\searchgoohs\googool.exe"C:\Program Files (x86)\searchgoohs\googool.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\searchgoohs\googool.exeFilesize
1.2MB
MD5f321a26a788b6a41a1f1a9bfdb7440b6
SHA172087b00f46fe41ad6190ccca5fcc506894c0bc2
SHA256530540436c154dc5801519bcdb82ad5fd82fb1d58e9453c4a89262cb3d4e9009
SHA5125123819a09a17fda6d56ad76311a80352013d2454a389ff009c9f1fec1ba88261ad64fd54da19f09b8409c1f2877d82b38640463a9476e699f5219c0c2d88bf9
-
\Program Files (x86)\searchgoohs\googool.exeFilesize
1.2MB
MD5f321a26a788b6a41a1f1a9bfdb7440b6
SHA172087b00f46fe41ad6190ccca5fcc506894c0bc2
SHA256530540436c154dc5801519bcdb82ad5fd82fb1d58e9453c4a89262cb3d4e9009
SHA5125123819a09a17fda6d56ad76311a80352013d2454a389ff009c9f1fec1ba88261ad64fd54da19f09b8409c1f2877d82b38640463a9476e699f5219c0c2d88bf9
-
\Program Files (x86)\searchgoohs\searchgoo.dllFilesize
123KB
MD5935d912d7d61c4e25169983f240d140b
SHA1fd882392bf957395c512f74bf4823cb96ec3f0c5
SHA256e0a2235595f5a364aa8c901e42c3c4059d4373af4c28d3b583e2d2cb906938fb
SHA51201b2f729d19fcc4761143ef9d964a3fdbb4fb8af682efd932341beb6a62c5212f27171eb15690ac47fc655d62d393a2492c417299657cefb4fe8021b6f312cdc
-
memory/1696-57-0x0000000000000000-mapping.dmp
-
memory/1696-60-0x0000000000400000-0x00000000007F1000-memory.dmpFilesize
3.9MB
-
memory/1696-61-0x0000000000400000-0x00000000007F1000-memory.dmpFilesize
3.9MB
-
memory/1696-62-0x0000000000400000-0x00000000007F1000-memory.dmpFilesize
3.9MB
-
memory/1696-63-0x0000000000400000-0x00000000007F1000-memory.dmpFilesize
3.9MB
-
memory/1696-64-0x0000000000400000-0x00000000007F1000-memory.dmpFilesize
3.9MB
-
memory/1696-65-0x0000000000400000-0x00000000007F1000-memory.dmpFilesize
3.9MB
-
memory/1976-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmpFilesize
8KB