Analysis
-
max time kernel
153s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 13:29
Static task
static1
Behavioral task
behavioral1
Sample
cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe
Resource
win10v2004-20220901-en
General
-
Target
cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe
-
Size
132KB
-
MD5
2f09ed02903a37f3d18ffc8358c080d9
-
SHA1
3c430c1bf0fb5d2eea34a34ae861f52b1f7f4808
-
SHA256
cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a
-
SHA512
bdaab30eb11ae4d9ff28a34e040f62937198569adfafcbbc8d6a7cd01a24e13ff472bdcd7231badaaf49c8e0e342b76c973f1b3d2c43a2b8e3d7f47ab5e5585d
-
SSDEEP
1536:2uxP9+eTIt/XFixXVG4e2JLBJ3Ue05znybzPe9jRwo7JaS1:B9+eTIZFixFG4e1ybGtwQL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaovoz.exe -
Executes dropped EXE 1 IoCs
pid Process 1924 gaovoz.exe -
Loads dropped DLL 2 IoCs
pid Process 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /c" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /z" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /P" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /b" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /S" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /K" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /L" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /l" cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /V" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /k" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /p" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /s" gaovoz.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /f" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /d" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /q" gaovoz.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /O" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /g" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /W" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /a" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /C" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /y" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /X" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /n" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /M" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /t" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /Q" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /H" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /j" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /u" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /Z" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /l" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /i" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /w" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /U" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /m" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /I" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /J" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /h" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /v" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /x" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /Y" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /E" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /G" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /T" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /o" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /e" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /N" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /R" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /D" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /r" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /B" gaovoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaovoz = "C:\\Users\\Admin\\gaovoz.exe /A" gaovoz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe 1924 gaovoz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe 1924 gaovoz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1924 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe 27 PID 1132 wrote to memory of 1924 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe 27 PID 1132 wrote to memory of 1924 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe 27 PID 1132 wrote to memory of 1924 1132 cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe"C:\Users\Admin\AppData\Local\Temp\cccf2f37be1c671ef68dd4bb4ba992668ae3d20038eb3ae6b86519a22280816a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\gaovoz.exe"C:\Users\Admin\gaovoz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5f867ec73fd50da94c57e3a7858a432b7
SHA1207df9f4f435621805cc291fcca28490b98a829f
SHA256cfa0b705cfb51ec9c4656310f8ea2c07acc19db569f2c73757cbfd18783d61aa
SHA5122a95da7e2b47501d956cf0d3161fc3a68fa0a0c2677ae7a9d26961f3448fd2b5b8c247f32007c4b42968b8fc95840a0dd5ab72e66fc88df2389bf62f0ddf90ad
-
Filesize
132KB
MD5f867ec73fd50da94c57e3a7858a432b7
SHA1207df9f4f435621805cc291fcca28490b98a829f
SHA256cfa0b705cfb51ec9c4656310f8ea2c07acc19db569f2c73757cbfd18783d61aa
SHA5122a95da7e2b47501d956cf0d3161fc3a68fa0a0c2677ae7a9d26961f3448fd2b5b8c247f32007c4b42968b8fc95840a0dd5ab72e66fc88df2389bf62f0ddf90ad
-
Filesize
132KB
MD5f867ec73fd50da94c57e3a7858a432b7
SHA1207df9f4f435621805cc291fcca28490b98a829f
SHA256cfa0b705cfb51ec9c4656310f8ea2c07acc19db569f2c73757cbfd18783d61aa
SHA5122a95da7e2b47501d956cf0d3161fc3a68fa0a0c2677ae7a9d26961f3448fd2b5b8c247f32007c4b42968b8fc95840a0dd5ab72e66fc88df2389bf62f0ddf90ad
-
Filesize
132KB
MD5f867ec73fd50da94c57e3a7858a432b7
SHA1207df9f4f435621805cc291fcca28490b98a829f
SHA256cfa0b705cfb51ec9c4656310f8ea2c07acc19db569f2c73757cbfd18783d61aa
SHA5122a95da7e2b47501d956cf0d3161fc3a68fa0a0c2677ae7a9d26961f3448fd2b5b8c247f32007c4b42968b8fc95840a0dd5ab72e66fc88df2389bf62f0ddf90ad