Analysis
-
max time kernel
64s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 01:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe
-
Size
37KB
-
MD5
21951414d7c026cb46c9f9a6ed7d5a70
-
SHA1
ae06dbd943393f99de5626d56a20dd07919d3366
-
SHA256
eeac66507183527f587d1b75644eb9ec2cd60a8aa88538ae7f84edf51130f15d
-
SHA512
07c63e3c02f40ac815c2eeeeb6d79cb0f201f458e180486fd5a4396e6f669ac8070bc1c5004c8bca87163bc301d4a24aeeb8d7b21420e05999656b94efe4fddf
-
SSDEEP
384:NXDUPQGDDUphUGPvlbblq2aPZHr3eVaRpS496SBsJnI8Bn1gl5:NXDUPVu1vlbpqHZz7pS49+dI8M
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe -
Drops file in System32 directory 3 IoCs
Processes:
NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eXe NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe File created C:\Windows\SysWOW64\GiGu.eml NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe -
Drops file in Windows directory 2 IoCs
Processes:
NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exedescription ioc process File created C:\Windows\uGiG.eXe NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe File opened for modification C:\Windows\uGiG.eXe NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2340 4460 WerFault.exe NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exepid process 4460 NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe 4460 NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 4232 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 5162⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4460 -ip 44601⤵PID:1660
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1424
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5db1ecc3bc968ae2ea3fe6ccc3f2454ca
SHA1d8be8544832cf1214e4938d0f71d296d0860105f
SHA256426d186ecb298f3f4bc5a7cc6d164a7446053554a6319007bcfb55343fd4c30b
SHA51203d96ed4cca7a78856cc7224ca84010b34ff993a033cd576509858aa209217dbd1bf7f0e5cd519e64b051fb0cc620e54c53c24289e989bc9c2e62d07b76c8edd