Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
4c953616aa2b9cd1623b1bf0d4c4ac24.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4c953616aa2b9cd1623b1bf0d4c4ac24.exe
Resource
win10v2004-20231215-en
General
-
Target
4c953616aa2b9cd1623b1bf0d4c4ac24.exe
-
Size
123KB
-
MD5
4c953616aa2b9cd1623b1bf0d4c4ac24
-
SHA1
8b0d54b81fc620dd022685f9391c5e0fb3c87e3e
-
SHA256
7df0e19bccf420f3b8d986e99e8e522048459aca5ae5d0c257c6219bcd6605d0
-
SHA512
51b09a4464f8d370603baaf936109e3b73589e9353086b691445e1ae40018e1832034ca1f6629ecb7f2171805f364b2ea18031b9fe51398303e6bee523530f4d
-
SSDEEP
3072:YP6nuMS0Vey2dVNrBNgpaVM5nTaQUKXtzpzm5z:YkJV72dfr3gkVM5nWQUKXtzZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 Sgozua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Sgozua.exe 4c953616aa2b9cd1623b1bf0d4c4ac24.exe File opened for modification C:\Windows\Sgozua.exe 4c953616aa2b9cd1623b1bf0d4c4ac24.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Sgozua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Sgozua.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4c953616aa2b9cd1623b1bf0d4c4ac24.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4c953616aa2b9cd1623b1bf0d4c4ac24.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\International Sgozua.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main Sgozua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe 2760 Sgozua.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1360 4c953616aa2b9cd1623b1bf0d4c4ac24.exe 2760 Sgozua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2760 1360 4c953616aa2b9cd1623b1bf0d4c4ac24.exe 94 PID 1360 wrote to memory of 2760 1360 4c953616aa2b9cd1623b1bf0d4c4ac24.exe 94 PID 1360 wrote to memory of 2760 1360 4c953616aa2b9cd1623b1bf0d4c4ac24.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c953616aa2b9cd1623b1bf0d4c4ac24.exe"C:\Users\Admin\AppData\Local\Temp\4c953616aa2b9cd1623b1bf0d4c4ac24.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\Sgozua.exeC:\Windows\Sgozua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD57f5ade0c6820a0808ec59ca6af42e881
SHA193b1b21fbba5c1cc44d70178c42cf41198134b39
SHA2564bc62b50e8cd9254d4fa12afb8acf20adce9e0cb5a0b9c3fb03e1f28b12385bd
SHA512015e84c8e11f35210489c8a79164cbdd548bfea9698000a93b5c96d9cff4394356dc002ec8f3b4214128eeb36fa077b3050f49bba0e1c88efa30411faef12db1
-
Filesize
93KB
MD52c5392efac8428921ccd7d715c570727
SHA1e71d5520318f955a4fe8ea73988aa58246d9139d
SHA25687cc7f011dd4a22ecd7ec80d94f7a27a7ae26c128d8425afa5cfc1f28d598949
SHA512aeaaba065b8ebef33e448d1af41f3d13bde53bae8ff54b9c1dc94c45747fb262b6f6eca40b2d41e48d225f80b054bb73da9ef31ee72089f7f530b605a981d998