Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 23:21
Behavioral task
behavioral1
Sample
d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe
Resource
win10v2004-20220901-en
General
-
Target
d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe
-
Size
227KB
-
MD5
a4f4e83d338b668b3e5de2a227619e32
-
SHA1
9f720978a5630b7bf47bf79bc40baea41de84c4f
-
SHA256
d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d
-
SHA512
2104c31040e5c661673c478afab474572a864b402ccca762ec17d490220a5200f976c86d97470b231b36f25452c8179d8cc1264dc9f25b87a1c9a4109e3ac813
-
SSDEEP
3072:jbQi390ezV3Q7RcaDryukKLeC1TkGNmCjxqX/fI/x0s29ygBqQkmDRK:jR39JsXryukHCRXmCjxqX3LZBOE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4672 Gwufoa.exe -
resource yara_rule behavioral2/files/0x0002000000022de4-134.dat upx behavioral2/files/0x0002000000022de4-135.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe File created C:\Windows\Gwufoa.exe d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe File opened for modification C:\Windows\Gwufoa.exe d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Gwufoa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Gwufoa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main Gwufoa.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\International Gwufoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe 4672 Gwufoa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4324 d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe 4672 Gwufoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4672 4324 d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe 82 PID 4324 wrote to memory of 4672 4324 d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe 82 PID 4324 wrote to memory of 4672 4324 d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe"C:\Users\Admin\AppData\Local\Temp\d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\Gwufoa.exeC:\Windows\Gwufoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5a4f4e83d338b668b3e5de2a227619e32
SHA19f720978a5630b7bf47bf79bc40baea41de84c4f
SHA256d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d
SHA5122104c31040e5c661673c478afab474572a864b402ccca762ec17d490220a5200f976c86d97470b231b36f25452c8179d8cc1264dc9f25b87a1c9a4109e3ac813
-
Filesize
227KB
MD5a4f4e83d338b668b3e5de2a227619e32
SHA19f720978a5630b7bf47bf79bc40baea41de84c4f
SHA256d12bb05c7c81580da6173250294b439d3b8032f6fd3462171af865d0fdd3243d
SHA5122104c31040e5c661673c478afab474572a864b402ccca762ec17d490220a5200f976c86d97470b231b36f25452c8179d8cc1264dc9f25b87a1c9a4109e3ac813
-
Filesize
426B
MD5c4e3e4e44cd0b891fc553499e7b3bd82
SHA199be75818f0dd002a020e9e7df1202dbad4e3c7c
SHA256e83f2593fd54b0dac58413432cca0b08cec6be9a6f3b8d3eb4aeca66d1c7e72f
SHA5128cace30a3ce0921a4344ffa84afc89063e70df046d099ff22d885df6f3ea969c14a300a22c6b62c354f614bfe50d01b3837d7f6952e67daac18496681dce2a32