Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 09:59

General

  • Target

    65887337509f6407b762ac1c7daa02fe.exe

  • Size

    152KB

  • MD5

    65887337509f6407b762ac1c7daa02fe

  • SHA1

    742979d0549e5d3fbdfd9968a83d0d8ffc8dcd50

  • SHA256

    7f8e53865f07357bfcd0c814ea8e19c9fbf6dcb6a46d42c3496ad108d23f3789

  • SHA512

    7e07c34156b783c078c3bea1380d928b9989639d65f424011993e58bccce1f43bbb0b573c9270a0659c5ee6019125d51c9c6ba4a8a7aacae0010408ccfad587e

  • SSDEEP

    3072:9MG2PYYh0ZR+7DxNUbaxIcz93bOButK+Fol:r+7DxVh3bHCl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65887337509f6407b762ac1c7daa02fe.exe
    "C:\Users\Admin\AppData\Local\Temp\65887337509f6407b762ac1c7daa02fe.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\geutog.exe
      "C:\Users\Admin\geutog.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\geutog.exe

          Filesize

          152KB

          MD5

          a4c7688e29a6fc8ff17ca9ebc2065196

          SHA1

          c4ace6d39c2e74ccf90a5da66014859c6aecc521

          SHA256

          60106f68b1f01b91443c0f14106f17cb01655e5f0971e24358ebbec3adc7fbec

          SHA512

          7ad5a57695a183745ff44c8ba7af7324bd2cceff713fa2eee7016d8fa13bc88bc5395d38275562cdb88914e237940719f4ff5eaf8aa2c01a8eb5d76cd5db2e40

        • C:\Users\Admin\geutog.exe

          Filesize

          84KB

          MD5

          ae7f28aec1de5eff55bf807df323355f

          SHA1

          5a76be560dfb16084677670fec59c6255cd9ab6f

          SHA256

          47684ca889ecbd3257e77242e5375b70ce641ea830b540a74e560905c136f8c0

          SHA512

          ee8bf23c851213bfa6838ae4861bbb0279012574a298eae8328e29c6ba99fdd13615631aba9be08a7f503113ea45f6eb91c7ee723257bcbbba30e7276fd4117b

        • C:\Users\Admin\geutog.exe

          Filesize

          73KB

          MD5

          a84f48aec02981b1e1889d7047c1522a

          SHA1

          5f067f3bda2b47d2dbfa5a2b329f04d548593a88

          SHA256

          ce20df879429c463dfa821c0dc0f4110952e959647b52935707be59eb05cd76e

          SHA512

          20d3477ab28c470182e0487f1e5308b787cd5ba46955c916a765286840a8c257ede1c550770333a3a30c099bdb0eb7c73d67373ae22b69c37aa7b8045de11402

        • \Users\Admin\geutog.exe

          Filesize

          150KB

          MD5

          f717db764c6fda3023dfdd36d3a3d133

          SHA1

          b11ef81b207615b49d6a993cf621ae8a789b5df0

          SHA256

          a8c2163f8dc31464184fae5415065354835bbb3fa5c309a77e699fcd15309c89

          SHA512

          fd2a33fc66684538581c475f0288aa51a4d8921080da4d674b6b3615f6a4d3b9d099c0a85455d30c0d63627a7b482350a0ecbf8c1424fffbd1bf7747fc5358fa

        • \Users\Admin\geutog.exe

          Filesize

          136KB

          MD5

          a642d8d315496d6caa8dd6cbc75e1113

          SHA1

          78d10a64c37e1de1a6f81183c6d6474221782b39

          SHA256

          f9004a6dad4133622549c9681339ef76f85f7dd1c1545a1c82c2182aec209147

          SHA512

          d5815c04e198f6a2f29c1575e9c291b34a2a0480c09f10dae16192176d0e4cc314b2cd10b8c37d531474c0de1eec1b8341673314a4d26cc792ac00ec064df505