Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 21:31
Static task
static1
Behavioral task
behavioral1
Sample
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe
Resource
win10v2004-20221111-en
General
-
Target
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe
-
Size
92KB
-
MD5
d86e720a88533e62cadd418b2f2f7599
-
SHA1
4d4f7b9635ce2554e8bf9f57f970061a1f219191
-
SHA256
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
-
SHA512
7a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887
-
SSDEEP
1536:/giuHKiksDOIeAMGXGyoI9y+kpFm94msrP9UnCcyUngZuc163Xqqi9T:YnKtsDOpAMGXGyoI9kpFm94msrP9UCc8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SystemService = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gbot\\svchost.exe" REG.exe -
Executes dropped EXE 1 IoCs
pid Process 624 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1380 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 1380 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1420 REG.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1380 wrote to memory of 624 1380 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 28 PID 1380 wrote to memory of 624 1380 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 28 PID 1380 wrote to memory of 624 1380 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 28 PID 1380 wrote to memory of 624 1380 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 28 PID 624 wrote to memory of 1420 624 svchost.exe 29 PID 624 wrote to memory of 1420 624 svchost.exe 29 PID 624 wrote to memory of 1420 624 svchost.exe 29 PID 624 wrote to memory of 1420 624 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe"C:\Users\Admin\AppData\Local\Temp\81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe"C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\REG.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run /V "SystemService" /D "C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe" /F3⤵
- Adds policy Run key to start application
- Modifies registry key
PID:1420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d86e720a88533e62cadd418b2f2f7599
SHA14d4f7b9635ce2554e8bf9f57f970061a1f219191
SHA25681f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
SHA5127a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887
-
Filesize
92KB
MD5d86e720a88533e62cadd418b2f2f7599
SHA14d4f7b9635ce2554e8bf9f57f970061a1f219191
SHA25681f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
SHA5127a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887
-
Filesize
92KB
MD5d86e720a88533e62cadd418b2f2f7599
SHA14d4f7b9635ce2554e8bf9f57f970061a1f219191
SHA25681f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
SHA5127a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887
-
Filesize
92KB
MD5d86e720a88533e62cadd418b2f2f7599
SHA14d4f7b9635ce2554e8bf9f57f970061a1f219191
SHA25681f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
SHA5127a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887