Overview
overview
10Static
static
3ggpermV3/A...64.exe
windows10-1703-x64
1ggpermV3/A...64.exe
windows10-2004-x64
1ggpermV3/T...er.exe
windows10-1703-x64
ggpermV3/T...er.exe
windows10-2004-x64
8ggpermV3/ggpermV3.exe
windows10-1703-x64
10ggpermV3/ggpermV3.exe
windows10-2004-x64
1ggpermV3/s...er.exe
windows10-1703-x64
1ggpermV3/s...er.exe
windows10-2004-x64
1ggpermV3/woof.bat
windows10-1703-x64
8ggpermV3/woof.bat
windows10-2004-x64
8Analysis
-
max time kernel
113s -
max time network
185s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
29-12-2023 01:03
Static task
static1
Behavioral task
behavioral1
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ggpermV3/ggpermV3.exe
Resource
win10-20231215-en
Behavioral task
behavioral6
Sample
ggpermV3/ggpermV3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ggpermV3/sxghr-driver.exe
Resource
win10-20231215-en
Behavioral task
behavioral8
Sample
ggpermV3/sxghr-driver.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ggpermV3/woof.bat
Resource
win10-20231215-en
Behavioral task
behavioral10
Sample
ggpermV3/woof.bat
Resource
win10v2004-20231215-en
General
-
Target
ggpermV3/woof.bat
-
Size
1KB
-
MD5
9dfe4e730dcc5e0d3951038ad2a095a1
-
SHA1
e033d9a40234b9544606ec4d603add264cb38841
-
SHA256
bfffd2faf6710e02912de0eec63b593f35a8bebef114932b4a4bc9c67fad59b8
-
SHA512
297e9950fd207687af957a94c5fb7d073bb89dcebdd6ee047fa0465f55bb95b42563c7310980bf1e41ca671a1f8c824e86dfe515b844f99f307965d199d8dbfd
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 4284 sc.exe 1860 sc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2816 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 26 IoCs
Processes:
pid process 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 644 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 4588 svchost.exe Token: SeIncreaseQuotaPrivilege 4588 svchost.exe Token: SeSecurityPrivilege 4588 svchost.exe Token: SeTakeOwnershipPrivilege 4588 svchost.exe Token: SeLoadDriverPrivilege 4588 svchost.exe Token: SeSystemtimePrivilege 4588 svchost.exe Token: SeBackupPrivilege 4588 svchost.exe Token: SeRestorePrivilege 4588 svchost.exe Token: SeShutdownPrivilege 4588 svchost.exe Token: SeSystemEnvironmentPrivilege 4588 svchost.exe Token: SeUndockPrivilege 4588 svchost.exe Token: SeManageVolumePrivilege 4588 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4588 svchost.exe Token: SeIncreaseQuotaPrivilege 4588 svchost.exe Token: SeSecurityPrivilege 4588 svchost.exe Token: SeTakeOwnershipPrivilege 4588 svchost.exe Token: SeLoadDriverPrivilege 4588 svchost.exe Token: SeSystemtimePrivilege 4588 svchost.exe Token: SeBackupPrivilege 4588 svchost.exe Token: SeRestorePrivilege 4588 svchost.exe Token: SeShutdownPrivilege 4588 svchost.exe Token: SeSystemEnvironmentPrivilege 4588 svchost.exe Token: SeUndockPrivilege 4588 svchost.exe Token: SeManageVolumePrivilege 4588 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4588 svchost.exe Token: SeIncreaseQuotaPrivilege 4588 svchost.exe Token: SeSecurityPrivilege 4588 svchost.exe Token: SeTakeOwnershipPrivilege 4588 svchost.exe Token: SeLoadDriverPrivilege 4588 svchost.exe Token: SeSystemtimePrivilege 4588 svchost.exe Token: SeBackupPrivilege 4588 svchost.exe Token: SeRestorePrivilege 4588 svchost.exe Token: SeShutdownPrivilege 4588 svchost.exe Token: SeSystemEnvironmentPrivilege 4588 svchost.exe Token: SeUndockPrivilege 4588 svchost.exe Token: SeManageVolumePrivilege 4588 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4588 svchost.exe Token: SeIncreaseQuotaPrivilege 4588 svchost.exe Token: SeSecurityPrivilege 4588 svchost.exe Token: SeTakeOwnershipPrivilege 4588 svchost.exe Token: SeLoadDriverPrivilege 4588 svchost.exe Token: SeSystemtimePrivilege 4588 svchost.exe Token: SeBackupPrivilege 4588 svchost.exe Token: SeRestorePrivilege 4588 svchost.exe Token: SeShutdownPrivilege 4588 svchost.exe Token: SeSystemEnvironmentPrivilege 4588 svchost.exe Token: SeUndockPrivilege 4588 svchost.exe Token: SeManageVolumePrivilege 4588 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4588 svchost.exe Token: SeIncreaseQuotaPrivilege 4588 svchost.exe Token: SeSecurityPrivilege 4588 svchost.exe Token: SeTakeOwnershipPrivilege 4588 svchost.exe Token: SeLoadDriverPrivilege 4588 svchost.exe Token: SeSystemtimePrivilege 4588 svchost.exe Token: SeBackupPrivilege 4588 svchost.exe Token: SeRestorePrivilege 4588 svchost.exe Token: SeShutdownPrivilege 4588 svchost.exe Token: SeSystemEnvironmentPrivilege 4588 svchost.exe Token: SeUndockPrivilege 4588 svchost.exe Token: SeManageVolumePrivilege 4588 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4588 svchost.exe Token: SeIncreaseQuotaPrivilege 4588 svchost.exe Token: SeSecurityPrivilege 4588 svchost.exe Token: SeTakeOwnershipPrivilege 4588 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exedescription pid process target process PID 236 wrote to memory of 2472 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2472 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2428 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2428 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2828 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2828 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 816 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 816 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3908 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3908 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4044 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4044 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 5004 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 5004 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1400 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1400 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3384 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3384 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 624 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 624 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4664 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4664 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 724 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 724 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2608 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2608 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4636 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4636 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 836 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 836 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3580 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3580 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1544 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1544 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1100 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1100 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1344 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 1344 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 5088 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 5088 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3828 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 3828 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4756 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4756 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4832 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4832 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2688 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2688 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2336 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 2336 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4512 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4512 236 cmd.exe AMIDEWINx64.EXE PID 236 wrote to memory of 4088 236 cmd.exe net.exe PID 236 wrote to memory of 4088 236 cmd.exe net.exe PID 4088 wrote to memory of 528 4088 net.exe net1.exe PID 4088 wrote to memory of 528 4088 net.exe net1.exe PID 236 wrote to memory of 2232 236 cmd.exe net.exe PID 236 wrote to memory of 2232 236 cmd.exe net.exe PID 2232 wrote to memory of 3620 2232 net.exe net1.exe PID 2232 wrote to memory of 3620 2232 net.exe net1.exe PID 236 wrote to memory of 4284 236 cmd.exe sc.exe PID 236 wrote to memory of 4284 236 cmd.exe sc.exe PID 236 wrote to memory of 1860 236 cmd.exe sc.exe PID 236 wrote to memory of 1860 236 cmd.exe sc.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\woof.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 248211476728510278132⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 163901272628894122012⤵PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 503817593645228502⤵PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV 23102731418546260722⤵PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV 278742880214356214982⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS 10919248198906133132⤵PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN 11612262981282232802⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO2⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT 222753088425574155192⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN 553943431627125692⤵PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 1682885477532105622⤵PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM 21277178982127258212⤵PID:724
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP 3032621186643928282⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 85261053518034209852⤵PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF 16218227272957228692⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM 3010298573028318562⤵PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP 70612878017939275282⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT 24341489123478250452⤵PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC 178791334325100222442⤵PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM 43055821911331542⤵PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CT 191572259568564452⤵PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV 13445193661154310132⤵PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA 1223114254826068082⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CO 124241545923167315022⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK 10475123292704127062⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK 20195793024645116822⤵PID:4512
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:528
-
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:3620
-
-
-
C:\Windows\system32\sc.exesc stop winmgmt2⤵
- Launches sc.exe
PID:4284
-
-
C:\Windows\system32\sc.exesc start winmgmt2⤵
- Launches sc.exe
PID:1860
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:2816
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4588