Analysis

  • max time kernel
    171s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 20:58

General

  • Target

    141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb.exe

  • Size

    815KB

  • MD5

    25f4e2ca4a326c626cedffc5ccb9c170

  • SHA1

    f1bb2121f75f32e32715dee877ef2f3ec5edc1e1

  • SHA256

    141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb

  • SHA512

    2ed80454d712239519658c2dedbd29b62662cc4c3811cacfe0077bf9f95801708753939dc79a1a8f711dbbb8eae48c2cb37626b0a79725a6a6e31f96d35304c6

  • SSDEEP

    12288:52JylsKTOeDQ4dvfLKVOTDPc7IudTc67BmN6IN2Irz0vu+agPh:52JyxqYv5GIQc90InrRoh

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb.exe
    "C:\Users\Admin\AppData\Local\Temp\141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb.mm
      C:\Users\Admin\AppData\Local\Temp\141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb.mm /zhj
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Windows\GOG.exe
        C:\Windows\GOG.exe /zhj
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:2808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb.mm

    Filesize

    768KB

    MD5

    13a200e017109016dde150396025f670

    SHA1

    2f22fd5c34538c2063b525e7b8e79ea4d38f123e

    SHA256

    637b9bc41c67f62fbbd79a04e0574b7c9d717573e9dd968f1319eacb082d0683

    SHA512

    445b9d02d49b259b0f7e0e1fc2217806b01c17e0f5487f192f4be6c28203602f3fb18d0d154a408daa8fb04ed117646654c18e318cbf7e8f830a4efbb3f37371

  • C:\Users\Admin\AppData\Local\Temp\141351a0635265ff761c5f62865a85bdf8f6e4b5ab09d544414e11354000cafb.mm

    Filesize

    768KB

    MD5

    13a200e017109016dde150396025f670

    SHA1

    2f22fd5c34538c2063b525e7b8e79ea4d38f123e

    SHA256

    637b9bc41c67f62fbbd79a04e0574b7c9d717573e9dd968f1319eacb082d0683

    SHA512

    445b9d02d49b259b0f7e0e1fc2217806b01c17e0f5487f192f4be6c28203602f3fb18d0d154a408daa8fb04ed117646654c18e318cbf7e8f830a4efbb3f37371

  • C:\Windows\GOG.exe

    Filesize

    768KB

    MD5

    13a200e017109016dde150396025f670

    SHA1

    2f22fd5c34538c2063b525e7b8e79ea4d38f123e

    SHA256

    637b9bc41c67f62fbbd79a04e0574b7c9d717573e9dd968f1319eacb082d0683

    SHA512

    445b9d02d49b259b0f7e0e1fc2217806b01c17e0f5487f192f4be6c28203602f3fb18d0d154a408daa8fb04ed117646654c18e318cbf7e8f830a4efbb3f37371

  • C:\Windows\GOG.exe

    Filesize

    768KB

    MD5

    13a200e017109016dde150396025f670

    SHA1

    2f22fd5c34538c2063b525e7b8e79ea4d38f123e

    SHA256

    637b9bc41c67f62fbbd79a04e0574b7c9d717573e9dd968f1319eacb082d0683

    SHA512

    445b9d02d49b259b0f7e0e1fc2217806b01c17e0f5487f192f4be6c28203602f3fb18d0d154a408daa8fb04ed117646654c18e318cbf7e8f830a4efbb3f37371