Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 20:58

General

  • Target

    ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.exe

  • Size

    736KB

  • MD5

    1ca5a7f75656b973576bce2507655550

  • SHA1

    c7200d68302c5ec35bb174f354164ee0dcdad680

  • SHA256

    ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409

  • SHA512

    b28649d381251bf9bc81fde4f903e693b4e4857b0173ea501198b33f83e386de096e05cfa18b9999abac51293e5257dbd98defd5766fc78e850669edf0f6b854

  • SSDEEP

    12288:52JylsKT/eDQ4dvfLKXjp2tzJdN81MJMddwjA0D0afl+PfGm:52JyxjYvcczJdN81MJMddcA0Dl4Gm

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.exe
    "C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.tmp
      C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.tmp
      2⤵
      • Executes dropped EXE
      PID:812
    • C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.mm
      C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.mm /zhj
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Windows\GOG.exe
        C:\Windows\GOG.exe /zhj
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:4408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.mm

    Filesize

    712KB

    MD5

    7a173e891a6f825e21ea795f81d77aa2

    SHA1

    72816b694bf32145edc06b24e9d3b0d9073a6bf0

    SHA256

    15f5ca15d49571575347516068e6ec4bd6cb9e99d78284a9805aa23f8d9b9326

    SHA512

    3dfd7ae3b5a83614e07dc8949451ef72d1880d9cee62d7d3eec94676011f9174770626e505e7e07ba43c77fc3dfabe983acc654de025490315d5d70b2c34c8f8

  • C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.mm

    Filesize

    712KB

    MD5

    7a173e891a6f825e21ea795f81d77aa2

    SHA1

    72816b694bf32145edc06b24e9d3b0d9073a6bf0

    SHA256

    15f5ca15d49571575347516068e6ec4bd6cb9e99d78284a9805aa23f8d9b9326

    SHA512

    3dfd7ae3b5a83614e07dc8949451ef72d1880d9cee62d7d3eec94676011f9174770626e505e7e07ba43c77fc3dfabe983acc654de025490315d5d70b2c34c8f8

  • C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.tmp

    Filesize

    24KB

    MD5

    8cb76728a17487c7317ad95723817881

    SHA1

    b42a0fd7aeb2a43f5e6bc01c6fcf4b6ba3c3bfbf

    SHA256

    b9ceee6fbb47def7712f0da8af4b65d5e69097d9831c76741d17770d4a5258d9

    SHA512

    357404b3b21f34f6d931e5f5367ab6ec5495055fba7c2710b70ff06677cd5f7a2d239c242722ef58ce3c6820e0c743c16b0ef43a6331e801a1ab03f17f64511e

  • C:\Users\Admin\AppData\Local\Temp\ae27b70a7fe431ce287ae4995a77b214cda24a1a9fca541138e5fc4fd0de1409.tmp

    Filesize

    24KB

    MD5

    8cb76728a17487c7317ad95723817881

    SHA1

    b42a0fd7aeb2a43f5e6bc01c6fcf4b6ba3c3bfbf

    SHA256

    b9ceee6fbb47def7712f0da8af4b65d5e69097d9831c76741d17770d4a5258d9

    SHA512

    357404b3b21f34f6d931e5f5367ab6ec5495055fba7c2710b70ff06677cd5f7a2d239c242722ef58ce3c6820e0c743c16b0ef43a6331e801a1ab03f17f64511e

  • C:\Windows\GOG.exe

    Filesize

    712KB

    MD5

    7a173e891a6f825e21ea795f81d77aa2

    SHA1

    72816b694bf32145edc06b24e9d3b0d9073a6bf0

    SHA256

    15f5ca15d49571575347516068e6ec4bd6cb9e99d78284a9805aa23f8d9b9326

    SHA512

    3dfd7ae3b5a83614e07dc8949451ef72d1880d9cee62d7d3eec94676011f9174770626e505e7e07ba43c77fc3dfabe983acc654de025490315d5d70b2c34c8f8

  • C:\Windows\GOG.exe

    Filesize

    712KB

    MD5

    7a173e891a6f825e21ea795f81d77aa2

    SHA1

    72816b694bf32145edc06b24e9d3b0d9073a6bf0

    SHA256

    15f5ca15d49571575347516068e6ec4bd6cb9e99d78284a9805aa23f8d9b9326

    SHA512

    3dfd7ae3b5a83614e07dc8949451ef72d1880d9cee62d7d3eec94676011f9174770626e505e7e07ba43c77fc3dfabe983acc654de025490315d5d70b2c34c8f8