Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a067a947f233d087057c6746a6f7f9e8.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
a067a947f233d087057c6746a6f7f9e8.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
a067a947f233d087057c6746a6f7f9e8.exe
-
Size
37KB
-
MD5
a067a947f233d087057c6746a6f7f9e8
-
SHA1
5d81096e8bcb52dc88a0f3cc555de78a31cccb4b
-
SHA256
ff90c4e0fb2dd5180e26daa86ed8de580fc0e9c67b287166121ed8ad17a64212
-
SHA512
9594b16da9865f590a15a88ce6cc136d204107b9175f97e3cf6438664f81d49d6f1689ee4c9069daeba36581c1b089bf292a2c0dba6b7956c732c57debb236cc
-
SSDEEP
768:gxG+C8+IsXh/2hNJgKHGhqhBlraAeUhfHH4V1I8E:OEIsEhNi/EXuAeUhf4V3E
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a067a947f233d087057c6746a6f7f9e8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" a067a947f233d087057c6746a6f7f9e8.exe -
Drops file in System32 directory 3 IoCs
Processes:
a067a947f233d087057c6746a6f7f9e8.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eml a067a947f233d087057c6746a6f7f9e8.exe File created C:\Windows\SysWOW64\GiGu.eXe a067a947f233d087057c6746a6f7f9e8.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe a067a947f233d087057c6746a6f7f9e8.exe -
Drops file in Windows directory 2 IoCs
Processes:
a067a947f233d087057c6746a6f7f9e8.exedescription ioc process File created C:\Windows\uGiG.eXe a067a947f233d087057c6746a6f7f9e8.exe File opened for modification C:\Windows\uGiG.eXe a067a947f233d087057c6746a6f7f9e8.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2420 2848 WerFault.exe a067a947f233d087057c6746a6f7f9e8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a067a947f233d087057c6746a6f7f9e8.exedescription pid process target process PID 2848 wrote to memory of 2420 2848 a067a947f233d087057c6746a6f7f9e8.exe WerFault.exe PID 2848 wrote to memory of 2420 2848 a067a947f233d087057c6746a6f7f9e8.exe WerFault.exe PID 2848 wrote to memory of 2420 2848 a067a947f233d087057c6746a6f7f9e8.exe WerFault.exe PID 2848 wrote to memory of 2420 2848 a067a947f233d087057c6746a6f7f9e8.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a067a947f233d087057c6746a6f7f9e8.exe"C:\Users\Admin\AppData\Local\Temp\a067a947f233d087057c6746a6f7f9e8.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1762⤵
- Program crash
PID:2420
-