Analysis
-
max time kernel
152s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe
Resource
win10v2004-20220901-en
General
-
Target
a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe
-
Size
268KB
-
MD5
59024dff77a87cd86a995739839af778
-
SHA1
4e5d14e08128338334a53f5ebaa48d8e826a02f1
-
SHA256
a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464
-
SHA512
9c71a679eb73331dfc3e6e04bdd06eb255570aa29ab9967a2beca9f552213470c012e8224f13fb8c674c842043fcbba19a9c9506f937e70ef8dd8ff5312dad72
-
SSDEEP
6144:XApnWkr9HoTs6UHVx0RG6J/LHRmUrR4Er75tLZudwQiony:CnWkrlooHVx0RG6JDHFrR4Er75tLZudm
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gieibug.exe -
Executes dropped EXE 1 IoCs
pid Process 1740 gieibug.exe -
Loads dropped DLL 2 IoCs
pid Process 1952 a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe 1952 a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /y" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /S" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /F" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /e" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /D" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /M" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /x" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /r" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /w" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /W" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /J" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /X" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /T" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /H" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /b" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /d" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /G" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /Z" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /E" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /g" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /m" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /B" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /u" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /U" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /A" gieibug.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /j" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /p" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /N" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /f" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /a" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /L" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /s" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /Y" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /o" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /I" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /h" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /P" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /n" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /k" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /q" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /O" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /V" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /z" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /v" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /c" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /i" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /Q" gieibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gieibug = "C:\\Users\\Admin\\gieibug.exe /t" gieibug.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe 1740 gieibug.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1952 a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe 1740 gieibug.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1740 1952 a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe 28 PID 1952 wrote to memory of 1740 1952 a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe 28 PID 1952 wrote to memory of 1740 1952 a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe 28 PID 1952 wrote to memory of 1740 1952 a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe 28 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18 PID 1740 wrote to memory of 1952 1740 gieibug.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe"C:\Users\Admin\AppData\Local\Temp\a79a3db3aea734b63c47b7073cb1aac88f873aabb0d102e55948561280023464.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\gieibug.exe"C:\Users\Admin\gieibug.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD593fa9508925a4211f097c650b163c2f0
SHA10b9e6731d7bae0f1eda555d22ab5778dfa612a70
SHA256520938110b191617e2dea2b3944d098710f1301f46a7d5ade6785413f1cfe95d
SHA512a9871aa8aff4b73d7b860ebaa5253eb89629e1d3b02bfbcdcd50df65a315749e9b401df0d253d581fd67452993308d29d0af734bc391f2343668a23ecb9c7aa6
-
Filesize
268KB
MD593fa9508925a4211f097c650b163c2f0
SHA10b9e6731d7bae0f1eda555d22ab5778dfa612a70
SHA256520938110b191617e2dea2b3944d098710f1301f46a7d5ade6785413f1cfe95d
SHA512a9871aa8aff4b73d7b860ebaa5253eb89629e1d3b02bfbcdcd50df65a315749e9b401df0d253d581fd67452993308d29d0af734bc391f2343668a23ecb9c7aa6
-
Filesize
268KB
MD593fa9508925a4211f097c650b163c2f0
SHA10b9e6731d7bae0f1eda555d22ab5778dfa612a70
SHA256520938110b191617e2dea2b3944d098710f1301f46a7d5ade6785413f1cfe95d
SHA512a9871aa8aff4b73d7b860ebaa5253eb89629e1d3b02bfbcdcd50df65a315749e9b401df0d253d581fd67452993308d29d0af734bc391f2343668a23ecb9c7aa6
-
Filesize
268KB
MD593fa9508925a4211f097c650b163c2f0
SHA10b9e6731d7bae0f1eda555d22ab5778dfa612a70
SHA256520938110b191617e2dea2b3944d098710f1301f46a7d5ade6785413f1cfe95d
SHA512a9871aa8aff4b73d7b860ebaa5253eb89629e1d3b02bfbcdcd50df65a315749e9b401df0d253d581fd67452993308d29d0af734bc391f2343668a23ecb9c7aa6