Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
65887337509f6407b762ac1c7daa02fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65887337509f6407b762ac1c7daa02fe.exe
Resource
win10v2004-20231222-en
General
-
Target
65887337509f6407b762ac1c7daa02fe.exe
-
Size
152KB
-
MD5
65887337509f6407b762ac1c7daa02fe
-
SHA1
742979d0549e5d3fbdfd9968a83d0d8ffc8dcd50
-
SHA256
7f8e53865f07357bfcd0c814ea8e19c9fbf6dcb6a46d42c3496ad108d23f3789
-
SHA512
7e07c34156b783c078c3bea1380d928b9989639d65f424011993e58bccce1f43bbb0b573c9270a0659c5ee6019125d51c9c6ba4a8a7aacae0010408ccfad587e
-
SSDEEP
3072:9MG2PYYh0ZR+7DxNUbaxIcz93bOButK+Fol:r+7DxVh3bHCl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geutog.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 65887337509f6407b762ac1c7daa02fe.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 geutog.exe -
Loads dropped DLL 2 IoCs
pid Process 2416 65887337509f6407b762ac1c7daa02fe.exe 2416 65887337509f6407b762ac1c7daa02fe.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /p" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /h" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /d" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /I" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /O" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /t" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /s" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /e" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /W" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /G" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /j" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /f" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /S" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /l" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /u" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /g" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /v" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /E" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /Z" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /i" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /Q" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /R" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /r" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /V" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /U" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /P" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /K" 65887337509f6407b762ac1c7daa02fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /L" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /T" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /M" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /m" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /K" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /C" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /F" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /D" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /H" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /o" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /k" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /a" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /z" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /X" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /B" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /x" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /q" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /n" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /A" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /Y" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /w" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /N" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /b" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /y" geutog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\geutog = "C:\\Users\\Admin\\geutog.exe /c" geutog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2416 65887337509f6407b762ac1c7daa02fe.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe 2704 geutog.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 65887337509f6407b762ac1c7daa02fe.exe 2704 geutog.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2704 2416 65887337509f6407b762ac1c7daa02fe.exe 28 PID 2416 wrote to memory of 2704 2416 65887337509f6407b762ac1c7daa02fe.exe 28 PID 2416 wrote to memory of 2704 2416 65887337509f6407b762ac1c7daa02fe.exe 28 PID 2416 wrote to memory of 2704 2416 65887337509f6407b762ac1c7daa02fe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\65887337509f6407b762ac1c7daa02fe.exe"C:\Users\Admin\AppData\Local\Temp\65887337509f6407b762ac1c7daa02fe.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\geutog.exe"C:\Users\Admin\geutog.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5a4c7688e29a6fc8ff17ca9ebc2065196
SHA1c4ace6d39c2e74ccf90a5da66014859c6aecc521
SHA25660106f68b1f01b91443c0f14106f17cb01655e5f0971e24358ebbec3adc7fbec
SHA5127ad5a57695a183745ff44c8ba7af7324bd2cceff713fa2eee7016d8fa13bc88bc5395d38275562cdb88914e237940719f4ff5eaf8aa2c01a8eb5d76cd5db2e40
-
Filesize
84KB
MD5ae7f28aec1de5eff55bf807df323355f
SHA15a76be560dfb16084677670fec59c6255cd9ab6f
SHA25647684ca889ecbd3257e77242e5375b70ce641ea830b540a74e560905c136f8c0
SHA512ee8bf23c851213bfa6838ae4861bbb0279012574a298eae8328e29c6ba99fdd13615631aba9be08a7f503113ea45f6eb91c7ee723257bcbbba30e7276fd4117b
-
Filesize
73KB
MD5a84f48aec02981b1e1889d7047c1522a
SHA15f067f3bda2b47d2dbfa5a2b329f04d548593a88
SHA256ce20df879429c463dfa821c0dc0f4110952e959647b52935707be59eb05cd76e
SHA51220d3477ab28c470182e0487f1e5308b787cd5ba46955c916a765286840a8c257ede1c550770333a3a30c099bdb0eb7c73d67373ae22b69c37aa7b8045de11402
-
Filesize
150KB
MD5f717db764c6fda3023dfdd36d3a3d133
SHA1b11ef81b207615b49d6a993cf621ae8a789b5df0
SHA256a8c2163f8dc31464184fae5415065354835bbb3fa5c309a77e699fcd15309c89
SHA512fd2a33fc66684538581c475f0288aa51a4d8921080da4d674b6b3615f6a4d3b9d099c0a85455d30c0d63627a7b482350a0ecbf8c1424fffbd1bf7747fc5358fa
-
Filesize
136KB
MD5a642d8d315496d6caa8dd6cbc75e1113
SHA178d10a64c37e1de1a6f81183c6d6474221782b39
SHA256f9004a6dad4133622549c9681339ef76f85f7dd1c1545a1c82c2182aec209147
SHA512d5815c04e198f6a2f29c1575e9c291b34a2a0480c09f10dae16192176d0e4cc314b2cd10b8c37d531474c0de1eec1b8341673314a4d26cc792ac00ec064df505