Overview
overview
10Static
static
3ggpermV3/A...64.exe
windows10-1703-x64
1ggpermV3/A...64.exe
windows10-2004-x64
1ggpermV3/T...er.exe
windows10-1703-x64
ggpermV3/T...er.exe
windows10-2004-x64
8ggpermV3/ggpermV3.exe
windows10-1703-x64
10ggpermV3/ggpermV3.exe
windows10-2004-x64
1ggpermV3/s...er.exe
windows10-1703-x64
1ggpermV3/s...er.exe
windows10-2004-x64
1ggpermV3/woof.bat
windows10-1703-x64
8ggpermV3/woof.bat
windows10-2004-x64
8Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 01:03
Static task
static1
Behavioral task
behavioral1
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ggpermV3/ggpermV3.exe
Resource
win10-20231215-en
Behavioral task
behavioral6
Sample
ggpermV3/ggpermV3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ggpermV3/sxghr-driver.exe
Resource
win10-20231215-en
Behavioral task
behavioral8
Sample
ggpermV3/sxghr-driver.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ggpermV3/woof.bat
Resource
win10-20231215-en
Behavioral task
behavioral10
Sample
ggpermV3/woof.bat
Resource
win10v2004-20231215-en
General
-
Target
ggpermV3/woof.bat
-
Size
1KB
-
MD5
9dfe4e730dcc5e0d3951038ad2a095a1
-
SHA1
e033d9a40234b9544606ec4d603add264cb38841
-
SHA256
bfffd2faf6710e02912de0eec63b593f35a8bebef114932b4a4bc9c67fad59b8
-
SHA512
297e9950fd207687af957a94c5fb7d073bb89dcebdd6ee047fa0465f55bb95b42563c7310980bf1e41ca671a1f8c824e86dfe515b844f99f307965d199d8dbfd
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 3144 sc.exe 4356 sc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 4408 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 26 IoCs
Processes:
pid process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 1552 svchost.exe Token: SeIncreaseQuotaPrivilege 1552 svchost.exe Token: SeSecurityPrivilege 1552 svchost.exe Token: SeTakeOwnershipPrivilege 1552 svchost.exe Token: SeLoadDriverPrivilege 1552 svchost.exe Token: SeSystemtimePrivilege 1552 svchost.exe Token: SeBackupPrivilege 1552 svchost.exe Token: SeRestorePrivilege 1552 svchost.exe Token: SeShutdownPrivilege 1552 svchost.exe Token: SeSystemEnvironmentPrivilege 1552 svchost.exe Token: SeUndockPrivilege 1552 svchost.exe Token: SeManageVolumePrivilege 1552 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1552 svchost.exe Token: SeIncreaseQuotaPrivilege 1552 svchost.exe Token: SeSecurityPrivilege 1552 svchost.exe Token: SeTakeOwnershipPrivilege 1552 svchost.exe Token: SeLoadDriverPrivilege 1552 svchost.exe Token: SeSystemtimePrivilege 1552 svchost.exe Token: SeBackupPrivilege 1552 svchost.exe Token: SeRestorePrivilege 1552 svchost.exe Token: SeShutdownPrivilege 1552 svchost.exe Token: SeSystemEnvironmentPrivilege 1552 svchost.exe Token: SeUndockPrivilege 1552 svchost.exe Token: SeManageVolumePrivilege 1552 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1552 svchost.exe Token: SeIncreaseQuotaPrivilege 1552 svchost.exe Token: SeSecurityPrivilege 1552 svchost.exe Token: SeTakeOwnershipPrivilege 1552 svchost.exe Token: SeLoadDriverPrivilege 1552 svchost.exe Token: SeSystemtimePrivilege 1552 svchost.exe Token: SeBackupPrivilege 1552 svchost.exe Token: SeRestorePrivilege 1552 svchost.exe Token: SeShutdownPrivilege 1552 svchost.exe Token: SeSystemEnvironmentPrivilege 1552 svchost.exe Token: SeUndockPrivilege 1552 svchost.exe Token: SeManageVolumePrivilege 1552 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1552 svchost.exe Token: SeIncreaseQuotaPrivilege 1552 svchost.exe Token: SeSecurityPrivilege 1552 svchost.exe Token: SeTakeOwnershipPrivilege 1552 svchost.exe Token: SeLoadDriverPrivilege 1552 svchost.exe Token: SeSystemtimePrivilege 1552 svchost.exe Token: SeBackupPrivilege 1552 svchost.exe Token: SeRestorePrivilege 1552 svchost.exe Token: SeShutdownPrivilege 1552 svchost.exe Token: SeSystemEnvironmentPrivilege 1552 svchost.exe Token: SeUndockPrivilege 1552 svchost.exe Token: SeManageVolumePrivilege 1552 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1552 svchost.exe Token: SeIncreaseQuotaPrivilege 1552 svchost.exe Token: SeSecurityPrivilege 1552 svchost.exe Token: SeTakeOwnershipPrivilege 1552 svchost.exe Token: SeLoadDriverPrivilege 1552 svchost.exe Token: SeSystemtimePrivilege 1552 svchost.exe Token: SeBackupPrivilege 1552 svchost.exe Token: SeRestorePrivilege 1552 svchost.exe Token: SeShutdownPrivilege 1552 svchost.exe Token: SeSystemEnvironmentPrivilege 1552 svchost.exe Token: SeUndockPrivilege 1552 svchost.exe Token: SeManageVolumePrivilege 1552 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1552 svchost.exe Token: SeIncreaseQuotaPrivilege 1552 svchost.exe Token: SeSecurityPrivilege 1552 svchost.exe Token: SeTakeOwnershipPrivilege 1552 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exedescription pid process target process PID 2748 wrote to memory of 4556 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4556 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 900 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 900 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3356 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3356 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 2104 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 2104 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1496 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1496 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1060 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1060 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 800 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 800 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4868 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4868 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1180 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1180 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3076 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3076 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1540 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1540 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4848 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4848 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1372 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 1372 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 436 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 436 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4628 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4628 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4836 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4836 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4688 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4688 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 208 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 208 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4904 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4904 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4240 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4240 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4976 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4976 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4484 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4484 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3960 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3960 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4168 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 4168 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3652 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 3652 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 2360 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 2360 2748 cmd.exe AMIDEWINx64.EXE PID 2748 wrote to memory of 968 2748 cmd.exe net.exe PID 2748 wrote to memory of 968 2748 cmd.exe net.exe PID 968 wrote to memory of 3552 968 net.exe net1.exe PID 968 wrote to memory of 3552 968 net.exe net1.exe PID 2748 wrote to memory of 2980 2748 cmd.exe net.exe PID 2748 wrote to memory of 2980 2748 cmd.exe net.exe PID 2980 wrote to memory of 4732 2980 net.exe net1.exe PID 2980 wrote to memory of 4732 2980 net.exe net1.exe PID 2748 wrote to memory of 3144 2748 cmd.exe sc.exe PID 2748 wrote to memory of 3144 2748 cmd.exe sc.exe PID 2748 wrote to memory of 4356 2748 cmd.exe sc.exe PID 2748 wrote to memory of 4356 2748 cmd.exe sc.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\woof.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 19060109266211762⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV 245991677210325122972⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS 3113263682816689022⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV 130012114527212225842⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 17652273508925251342⤵PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 24697323125032309112⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN 137553204810757197962⤵PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT 299099169842315232⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN 282301514813244301282⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM 20023298161783243592⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF 280851206431069224242⤵PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP 18972246441378321862⤵PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM 54824157583256522⤵PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV 32188199122660320842⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CO 23917310852849749752⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA 29506182992439068992⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CT 120631209213174254822⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC 22853285229365129802⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT 169723218114930228772⤵PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM 32651066523035162092⤵PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 9331484125269223272⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP 236835592618972942⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 42451294930138279832⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO2⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK 11110218801755096922⤵PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK 21234666437017402⤵PID:2360
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:968
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:4732
-
-
-
C:\Windows\system32\sc.exesc stop winmgmt2⤵
- Launches sc.exe
PID:3144
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:4408
-
-
C:\Windows\system32\sc.exesc start winmgmt2⤵
- Launches sc.exe
PID:4356
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y1⤵PID:3552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1552