Analysis

  • max time kernel
    184s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 12:04 UTC

General

  • Target

    dec2388900541d3e96b5d41bdfd9cae8ce4bee4e3b6c22eb07c9bfa5164b3d13.exe

  • Size

    37KB

  • MD5

    f15392e92718a378726cc04e701a7f9c

  • SHA1

    793336ac1dafa0f6a81b2d6889466ff38350ec5e

  • SHA256

    dec2388900541d3e96b5d41bdfd9cae8ce4bee4e3b6c22eb07c9bfa5164b3d13

  • SHA512

    e4ab760fb1f34652dd564b53deaf374063085f25a7548178d46ebeed00112f89f4cf8e338c2a4a5b93030d265bb088334d7d1826e94683c9f5726b2a92b93912

  • SSDEEP

    768:8uNor3AmmhmjMt+1ihv5rm04kzGWrgH1syep5TaFnciFJzu86rwT:39mmhmjMtEYv59zQap5uFnciFX6rK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dec2388900541d3e96b5d41bdfd9cae8ce4bee4e3b6c22eb07c9bfa5164b3d13.exe
    "C:\Users\Admin\AppData\Local\Temp\dec2388900541d3e96b5d41bdfd9cae8ce4bee4e3b6c22eb07c9bfa5164b3d13.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Users\Admin\AppData\Roaming\gooby.exe
      "C:\Users\Admin\AppData\Roaming\gooby.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1356

Network

  • flag-unknown
    DNS
    226.101.242.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    226.101.242.52.in-addr.arpa
    IN PTR
    Response
  • 72.21.81.240:80
    46 B
    40 B
    1
    1
  • 72.21.81.240:80
    260 B
    5
  • 72.21.81.240:80
    322 B
    7
  • 72.21.81.240:80
    260 B
    5
  • 72.21.81.240:80
    260 B
    5
  • 104.80.225.205:443
    322 B
    7
  • 8.8.8.8:53
    226.101.242.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    226.101.242.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gooby.exe

    Filesize

    37KB

    MD5

    f15392e92718a378726cc04e701a7f9c

    SHA1

    793336ac1dafa0f6a81b2d6889466ff38350ec5e

    SHA256

    dec2388900541d3e96b5d41bdfd9cae8ce4bee4e3b6c22eb07c9bfa5164b3d13

    SHA512

    e4ab760fb1f34652dd564b53deaf374063085f25a7548178d46ebeed00112f89f4cf8e338c2a4a5b93030d265bb088334d7d1826e94683c9f5726b2a92b93912

  • C:\Users\Admin\AppData\Roaming\gooby.exe

    Filesize

    37KB

    MD5

    f15392e92718a378726cc04e701a7f9c

    SHA1

    793336ac1dafa0f6a81b2d6889466ff38350ec5e

    SHA256

    dec2388900541d3e96b5d41bdfd9cae8ce4bee4e3b6c22eb07c9bfa5164b3d13

    SHA512

    e4ab760fb1f34652dd564b53deaf374063085f25a7548178d46ebeed00112f89f4cf8e338c2a4a5b93030d265bb088334d7d1826e94683c9f5726b2a92b93912

  • memory/1356-136-0x00007FFDF9870000-0x00007FFDFA2A6000-memory.dmp

    Filesize

    10.2MB

  • memory/4652-132-0x00007FFDF9870000-0x00007FFDFA2A6000-memory.dmp

    Filesize

    10.2MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.