Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
13-12-2022 04:30
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe
-
Size
272KB
-
MD5
1d4d868cf4d8698f270a73cd58c7f41f
-
SHA1
1b16a35ff3b7656262ebdce1e2fdc0148ad3bf4e
-
SHA256
afb4878ecf77a506fee3c5d2b817d8197edd0df8baddb32563027023e6bf35cc
-
SHA512
7c5ffc0bbb762803b57899dc93055e29c60f4fbbf4577a76d3b81ca60a3a2f9c48c8e20abccc5e8aa009efe3261a96566b350caadac6793358b46e63c92543be
-
SSDEEP
6144:9kw0oUn1IawKrpSts87Jsaz1Dq5RIzEuSX205hfBO:goU1YKrpStsotDq5R89KrXs
Malware Config
Extracted
formbook
scse
SKpYFyVNT2zunKf0uuM=
FlEHUseI7I5XbrO8fR/XBcS9ZA==
FPuxoUOxkLiATugw
VKdxsDSk0jdT5Kw=
FpqHf9iI/1tl97E=
YGI6sIl3UIxfZvlD+JiUuuLR
oBAEO0suBEAD5aK00A==
RKJqTzg4gQ/Q6DYSuTjDGkwuyl0ik5Kb8w==
VFg9s3W0/Ype8A3cZb+D7g==
hwD+VNd6014nrsaTWm4FBcS9ZA==
zkAdUq1soKYUfZaTqLmL
XVQ9WbRivUIQ477a/hKv+g==
QireF2geizAwmp674AGc5g==
PSTUQxs6j8OATugw
LHJhyy2VbX8NEqf0uuM=
MiY1vg6T3HqATugw
wqkUjaVXnGgBqA==
jUr/eUtSIT01Wegt
PjQidcqKzAbSZICUZb+D7g==
OkAmcv12sUEAIHwFHakzdIo2FPHw
zyDLsw+3I3H6gnaGZb+D7g==
ll0HRs5IJGxCZMJPahHgOt2RqjU=
YqaIEokHuw6V
jGJG11YCObJ+IQIXCW8KU+ZcbA==
jv4ITr8zITdT5Kw=
nXYro3yHe5YV5aK00A==
rJt1IPkxeQDUayhVCJyUuuLR
oFwz1DUU/RdD5aK00A==
FHlVTKEVIRFE5aK00A==
8GhjL2lJOWD+5aK00A==
k3BLouunGsagwhAi6oeUuuLR
p45GiQN5bZMjR9karDwDa442FPHw
Zdd7rVCKu/b3TIVU6t/lP92RqjU=
wyjxGjYHuw6V
nW5RrwV6yTdT5Kw=
itzGDGclWW4SqnLBSWH5Pt2RqjU=
8zwgceJYRWn+DKf0uuM=
EmojFmj027tsHrs=
ExQEPY5UyyS00HPvNNCH8w==
laiGCZRTkbg/XAl/Zb+D7g==
wYQysWBl+DdT5Kw=
MWo3rYV3XoAJ5aK00A==
hnht0SrcDR+XpjV6H6WUuuLR
rxqw6S7qG8A=
aEcfph/RAUAcfZYnXOw=
EXdVkuuzJ8eEjkTROs2D
MDYsc8l6w0wM7ZOiyQ==
Rw3XPwT+8UID5aK00A==
zDPp+Pskft/5iqS+0Q==
Z8h8hYCm/ULHXQ+YY2kJBcS9ZA==
vTDkm31vabx5EfoFMjLsVpBlz+fQfg==
+EcrRpZyp7tFba65dhvXBcS9ZA==
rHVJpwl6dLSATugw
gUoTghFSoTMpiXyQe9N3uOjQ
47Zwn/CkFQCty07ROs2D
NYkP+jcHuw6V
nfvdFnkHuw6V
L4piRRhAmfwGKITjemhRkmQ=
s6Jdx36Q+t5U7LE=
58iYH6dVmzYCnHZ/Zb+D7g==
IQ/WHZJWuVUD5aK00A==
Cf6t72PUxhnicjvBiFxqP0o2FPHw
DQr7l4R4rlEJ5aK00A==
62gezKeQv8mIIBbcZb+D7g==
kmuregister.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
otjcwtdly.exeotjcwtdly.exepid process 1992 otjcwtdly.exe 1028 otjcwtdly.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
otjcwtdly.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation otjcwtdly.exe -
Loads dropped DLL 3 IoCs
Processes:
SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exeotjcwtdly.exehelp.exepid process 2036 SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe 1992 otjcwtdly.exe 996 help.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
otjcwtdly.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gadfi = "C:\\Users\\Admin\\AppData\\Roaming\\mysogpvuay\\jabjklrj.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\otjcwtdly.exe\" C:\\Users\\Admin\\AppData\\Lo" otjcwtdly.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
otjcwtdly.exeotjcwtdly.exehelp.exedescription pid process target process PID 1992 set thread context of 1028 1992 otjcwtdly.exe otjcwtdly.exe PID 1028 set thread context of 1288 1028 otjcwtdly.exe Explorer.EXE PID 996 set thread context of 1288 996 help.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
help.exedescription ioc process Key created \Registry\User\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
otjcwtdly.exehelp.exepid process 1028 otjcwtdly.exe 1028 otjcwtdly.exe 1028 otjcwtdly.exe 1028 otjcwtdly.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1288 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
otjcwtdly.exeotjcwtdly.exehelp.exepid process 1992 otjcwtdly.exe 1028 otjcwtdly.exe 1028 otjcwtdly.exe 1028 otjcwtdly.exe 996 help.exe 996 help.exe 996 help.exe 996 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
otjcwtdly.exehelp.exedescription pid process Token: SeDebugPrivilege 1028 otjcwtdly.exe Token: SeDebugPrivilege 996 help.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1288 Explorer.EXE 1288 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1288 Explorer.EXE 1288 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exeotjcwtdly.exeExplorer.EXEhelp.exedescription pid process target process PID 2036 wrote to memory of 1992 2036 SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe otjcwtdly.exe PID 2036 wrote to memory of 1992 2036 SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe otjcwtdly.exe PID 2036 wrote to memory of 1992 2036 SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe otjcwtdly.exe PID 2036 wrote to memory of 1992 2036 SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe otjcwtdly.exe PID 1992 wrote to memory of 1028 1992 otjcwtdly.exe otjcwtdly.exe PID 1992 wrote to memory of 1028 1992 otjcwtdly.exe otjcwtdly.exe PID 1992 wrote to memory of 1028 1992 otjcwtdly.exe otjcwtdly.exe PID 1992 wrote to memory of 1028 1992 otjcwtdly.exe otjcwtdly.exe PID 1992 wrote to memory of 1028 1992 otjcwtdly.exe otjcwtdly.exe PID 1288 wrote to memory of 996 1288 Explorer.EXE help.exe PID 1288 wrote to memory of 996 1288 Explorer.EXE help.exe PID 1288 wrote to memory of 996 1288 Explorer.EXE help.exe PID 1288 wrote to memory of 996 1288 Explorer.EXE help.exe PID 996 wrote to memory of 1176 996 help.exe Firefox.exe PID 996 wrote to memory of 1176 996 help.exe Firefox.exe PID 996 wrote to memory of 1176 996 help.exe Firefox.exe PID 996 wrote to memory of 1176 996 help.exe Firefox.exe PID 996 wrote to memory of 1176 996 help.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Garf.Gen.6.7190.31519.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\otjcwtdly.exe"C:\Users\Admin\AppData\Local\Temp\otjcwtdly.exe" C:\Users\Admin\AppData\Local\Temp\zbaerndijaa.sqr3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\otjcwtdly.exe"C:\Users\Admin\AppData\Local\Temp\otjcwtdly.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\axtruztvea.wbFilesize
184KB
MD51a031ef2cb153396b7481e7e4bfafa66
SHA160a43557c8d8821d8055379ac0165c6d8e98ecbd
SHA25620098d4c4c575a2947c0a57bdad6853509ac15ce79a634a0f46468eae0a4117f
SHA5129fa62c2bac1ae53fea8deb45cd06cb3849388621aee7994e291a34467eeaa2992f42d7b75bf695126a9d0b25a70109c0ab16d89374f459dd2d5711160fb95eb2
-
C:\Users\Admin\AppData\Local\Temp\otjcwtdly.exeFilesize
140KB
MD57ba58c2011de212d4aec024834cef978
SHA158362c463dcba5861d65cde59a069ab041258173
SHA25648677f9d96811ac8197266885800043f89cf86293902aa8a416339d540e4b665
SHA5123ed1c8b68eee2e7b22ee3f9b03c8b92d775775f9171bfa2b5244841e69886a87b8141c190d8174bf2bd0d87617851ac6ca56fca89809ab91bd7f29136d3e5d24
-
C:\Users\Admin\AppData\Local\Temp\otjcwtdly.exeFilesize
140KB
MD57ba58c2011de212d4aec024834cef978
SHA158362c463dcba5861d65cde59a069ab041258173
SHA25648677f9d96811ac8197266885800043f89cf86293902aa8a416339d540e4b665
SHA5123ed1c8b68eee2e7b22ee3f9b03c8b92d775775f9171bfa2b5244841e69886a87b8141c190d8174bf2bd0d87617851ac6ca56fca89809ab91bd7f29136d3e5d24
-
C:\Users\Admin\AppData\Local\Temp\otjcwtdly.exeFilesize
140KB
MD57ba58c2011de212d4aec024834cef978
SHA158362c463dcba5861d65cde59a069ab041258173
SHA25648677f9d96811ac8197266885800043f89cf86293902aa8a416339d540e4b665
SHA5123ed1c8b68eee2e7b22ee3f9b03c8b92d775775f9171bfa2b5244841e69886a87b8141c190d8174bf2bd0d87617851ac6ca56fca89809ab91bd7f29136d3e5d24
-
C:\Users\Admin\AppData\Local\Temp\zbaerndijaa.sqrFilesize
7KB
MD521acad60952e66249f350dbe2f5ebeb3
SHA1cd206cc6c2301ae6b14aee46446563ccd9be8ae3
SHA25647be6918715cb45efa5ec06041ed8bf4637f759b604a1a8e7dc3549462144936
SHA5123901540c8cc5a43fbcfe0c591e962e66ddd0bb58352e39462d1c51d50aed7c1d609d323d31cf9deaca0dceb8c92f25caa994d968dc6431be4de6726e70a45e90
-
\Users\Admin\AppData\Local\Temp\otjcwtdly.exeFilesize
140KB
MD57ba58c2011de212d4aec024834cef978
SHA158362c463dcba5861d65cde59a069ab041258173
SHA25648677f9d96811ac8197266885800043f89cf86293902aa8a416339d540e4b665
SHA5123ed1c8b68eee2e7b22ee3f9b03c8b92d775775f9171bfa2b5244841e69886a87b8141c190d8174bf2bd0d87617851ac6ca56fca89809ab91bd7f29136d3e5d24
-
\Users\Admin\AppData\Local\Temp\otjcwtdly.exeFilesize
140KB
MD57ba58c2011de212d4aec024834cef978
SHA158362c463dcba5861d65cde59a069ab041258173
SHA25648677f9d96811ac8197266885800043f89cf86293902aa8a416339d540e4b665
SHA5123ed1c8b68eee2e7b22ee3f9b03c8b92d775775f9171bfa2b5244841e69886a87b8141c190d8174bf2bd0d87617851ac6ca56fca89809ab91bd7f29136d3e5d24
-
\Users\Admin\AppData\Local\Temp\sqlite3.dllFilesize
825KB
MD500a91261929192a7facc32a9f330029a
SHA17df4ffdf48a6df0bac21a82d6db56aa11db470dc
SHA256c1de8eca6419634c5f6e0e8c6ef14d9b3daa28fa28e8d1c4ce0175dbc310a77f
SHA51218a178ca0e70fa6e8f04b4ae229cfd6ef0df252e3fd85d09cf79f89e69ada89e3479db83227095a8c16325b1dc27c9ec0c782af304f7ce0afa78c2e25b49b01e
-
memory/996-73-0x0000000000880000-0x0000000000B83000-memory.dmpFilesize
3.0MB
-
memory/996-70-0x0000000000000000-mapping.dmp
-
memory/996-76-0x0000000000120000-0x000000000014D000-memory.dmpFilesize
180KB
-
memory/996-74-0x0000000000640000-0x00000000006CF000-memory.dmpFilesize
572KB
-
memory/996-72-0x0000000000120000-0x000000000014D000-memory.dmpFilesize
180KB
-
memory/996-71-0x00000000005A0000-0x00000000005A6000-memory.dmpFilesize
24KB
-
memory/1028-67-0x0000000000830000-0x0000000000B33000-memory.dmpFilesize
3.0MB
-
memory/1028-68-0x00000000002A0000-0x00000000002B0000-memory.dmpFilesize
64KB
-
memory/1028-63-0x00000000004012B0-mapping.dmp
-
memory/1028-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1028-65-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1288-69-0x0000000007BD0000-0x0000000007D48000-memory.dmpFilesize
1.5MB
-
memory/1288-75-0x00000000065C0000-0x00000000066C5000-memory.dmpFilesize
1.0MB
-
memory/1288-78-0x00000000065C0000-0x00000000066C5000-memory.dmpFilesize
1.0MB
-
memory/1992-56-0x0000000000000000-mapping.dmp
-
memory/2036-54-0x00000000753D1000-0x00000000753D3000-memory.dmpFilesize
8KB