Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe
Resource
win10v2004-20220812-en
General
-
Target
beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe
-
Size
208KB
-
MD5
a4f775cb92d08bc2e6a66ac52aca8ea0
-
SHA1
2407e904fdc9acf6121462830ad95734fbd6b556
-
SHA256
beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115
-
SHA512
30b70a8aaac420a754f7f47912b48675957bd111dd4cf09ab8cb661fd4eead2adbc1beb3e30507f29f2f7e32456481b2a8030e4546ea766b7a70d50ee851d6f4
-
SSDEEP
3072:128p0ZyAFYgGFWKMNVCUEIfcsELmLXMt/79ffQbEk:tAKWKMNVCicsESMBqf
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giifed.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 giifed.exe -
Loads dropped DLL 2 IoCs
pid Process 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /x" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /c" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /g" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /l" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /m" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /j" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /u" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /r" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /k" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /m" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /e" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /q" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /t" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /w" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /e" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /t" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /j" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /f" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /n" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /n" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /p" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /s" giifed.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /u" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /a" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /y" giifed.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /b" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /v" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /g" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /p" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /v" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /d" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /y" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /f" beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /p" beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /z" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /z" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /i" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /i" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /r" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /b" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /l" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /s" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /h" giifed.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /q" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /f" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /o" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /c" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /w" giifed.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /o" giifed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /a" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /k" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /d" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /x" giifed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\giifed = "C:\\Users\\Admin\\giifed.exe /h" giifed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe 1984 giifed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe 1984 giifed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1984 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe 27 PID 1636 wrote to memory of 1984 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe 27 PID 1636 wrote to memory of 1984 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe 27 PID 1636 wrote to memory of 1984 1636 beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe"C:\Users\Admin\AppData\Local\Temp\beff1f3e49a1cad80b9048b6050a33cc23aff342dee348030b636388c5da1115.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\giifed.exe"C:\Users\Admin\giifed.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD59f40de15a2f2326a2b4436f1b1a21ed9
SHA1e001754455752cd8fd138ddd575a93e01fe71fe5
SHA2568bc8ef2f5e70cd18fc6c75c8c874e85270c5e2445d7b955cad1047e5389abc5d
SHA512dc6405a6d37dc4189686222f3bdf1b7525e9ca82b8fa021e96b4980ed156f6ef821f78ab4d3411aec2805cde22cb1f6aee4f0c6a3555599e9c6d80052d3af6e9
-
Filesize
208KB
MD59f40de15a2f2326a2b4436f1b1a21ed9
SHA1e001754455752cd8fd138ddd575a93e01fe71fe5
SHA2568bc8ef2f5e70cd18fc6c75c8c874e85270c5e2445d7b955cad1047e5389abc5d
SHA512dc6405a6d37dc4189686222f3bdf1b7525e9ca82b8fa021e96b4980ed156f6ef821f78ab4d3411aec2805cde22cb1f6aee4f0c6a3555599e9c6d80052d3af6e9
-
Filesize
208KB
MD59f40de15a2f2326a2b4436f1b1a21ed9
SHA1e001754455752cd8fd138ddd575a93e01fe71fe5
SHA2568bc8ef2f5e70cd18fc6c75c8c874e85270c5e2445d7b955cad1047e5389abc5d
SHA512dc6405a6d37dc4189686222f3bdf1b7525e9ca82b8fa021e96b4980ed156f6ef821f78ab4d3411aec2805cde22cb1f6aee4f0c6a3555599e9c6d80052d3af6e9
-
Filesize
208KB
MD59f40de15a2f2326a2b4436f1b1a21ed9
SHA1e001754455752cd8fd138ddd575a93e01fe71fe5
SHA2568bc8ef2f5e70cd18fc6c75c8c874e85270c5e2445d7b955cad1047e5389abc5d
SHA512dc6405a6d37dc4189686222f3bdf1b7525e9ca82b8fa021e96b4980ed156f6ef821f78ab4d3411aec2805cde22cb1f6aee4f0c6a3555599e9c6d80052d3af6e9