Analysis
-
max time kernel
176s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe
Resource
win10v2004-20221111-en
General
-
Target
5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe
-
Size
193KB
-
MD5
9502fb2e99a4b7337c03cda4a4eb735d
-
SHA1
ff931760a5543367657dcfcae84be3d690a01ea9
-
SHA256
5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71
-
SHA512
8bfa415dbc0b9d3fe0051f39d4b75504114bf96b4fdaf40e9df10ea968fb12e0c29a287524a4cb333195db37bd6aa8209d4720cec37b2a4e7517db9a5e1c8944
-
SSDEEP
3072:y8oXhlmg2AEr8QXmQ7HP0Rj/HU4GHvgmCQ+/G2dT2Ir8QZGpx:ZoXhlmgurhmMHqj/0vgmr+FTV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5056 googli.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1328 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4d38f73220557fc97790418294447c44 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\googli.exe\" .." googli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4d38f73220557fc97790418294447c44 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\googli.exe\" .." googli.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 5056 googli.exe Token: 33 5056 googli.exe Token: SeIncBasePriorityPrivilege 5056 googli.exe Token: 33 5056 googli.exe Token: SeIncBasePriorityPrivilege 5056 googli.exe Token: 33 5056 googli.exe Token: SeIncBasePriorityPrivilege 5056 googli.exe Token: 33 5056 googli.exe Token: SeIncBasePriorityPrivilege 5056 googli.exe Token: 33 5056 googli.exe Token: SeIncBasePriorityPrivilege 5056 googli.exe Token: 33 5056 googli.exe Token: SeIncBasePriorityPrivilege 5056 googli.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 372 wrote to memory of 5056 372 5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe 86 PID 372 wrote to memory of 5056 372 5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe 86 PID 372 wrote to memory of 5056 372 5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe 86 PID 5056 wrote to memory of 1328 5056 googli.exe 90 PID 5056 wrote to memory of 1328 5056 googli.exe 90 PID 5056 wrote to memory of 1328 5056 googli.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe"C:\Users\Admin\AppData\Local\Temp\5222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\googli.exe"C:\Users\Admin\AppData\Local\Temp\googli.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\googli.exe" "googli.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD59502fb2e99a4b7337c03cda4a4eb735d
SHA1ff931760a5543367657dcfcae84be3d690a01ea9
SHA2565222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71
SHA5128bfa415dbc0b9d3fe0051f39d4b75504114bf96b4fdaf40e9df10ea968fb12e0c29a287524a4cb333195db37bd6aa8209d4720cec37b2a4e7517db9a5e1c8944
-
Filesize
193KB
MD59502fb2e99a4b7337c03cda4a4eb735d
SHA1ff931760a5543367657dcfcae84be3d690a01ea9
SHA2565222f5ab1dcd71b05e9fd64294b883aa9d165c5c69b2898dcce35f8817207e71
SHA5128bfa415dbc0b9d3fe0051f39d4b75504114bf96b4fdaf40e9df10ea968fb12e0c29a287524a4cb333195db37bd6aa8209d4720cec37b2a4e7517db9a5e1c8944