Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
111edf6657040db8891c65382f421e3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
111edf6657040db8891c65382f421e3e.exe
Resource
win10v2004-20231215-en
General
-
Target
111edf6657040db8891c65382f421e3e.exe
-
Size
384KB
-
MD5
111edf6657040db8891c65382f421e3e
-
SHA1
87fa5105e8468ad12eb7445d167455892127d329
-
SHA256
af87862e3d5716998dd03684f898e27e4c4537f2f4c1e34f65925d0eaf75c558
-
SHA512
a5d275d65cf007805671bede203f3271f20c0aaaa6005023d8a960a6605defc82ce46d535cddd36d6aba4ee2c8bd914700761a6a9c9d4fee396abcc9cfe5b474
-
SSDEEP
6144:Hstj9IXZm8UhaUodKDZ23wpJEoKHjWZLKBPvHIWM5I:FpUzZ2ApGvWpaPvsI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 111edf6657040db8891c65382f421e3e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gazed.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 gazed.exe -
Loads dropped DLL 2 IoCs
pid Process 2216 111edf6657040db8891c65382f421e3e.exe 2216 111edf6657040db8891c65382f421e3e.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /l" 111edf6657040db8891c65382f421e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /x" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /l" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /r" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /o" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /d" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /h" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /w" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /j" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /p" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /q" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /s" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /b" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /k" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /n" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /u" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /e" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /y" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /v" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /m" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /z" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /f" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /i" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /a" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /t" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /g" gazed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\gazed = "C:\\Users\\Admin\\gazed.exe /c" gazed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 111edf6657040db8891c65382f421e3e.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe 2352 gazed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2216 111edf6657040db8891c65382f421e3e.exe 2352 gazed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2352 2216 111edf6657040db8891c65382f421e3e.exe 28 PID 2216 wrote to memory of 2352 2216 111edf6657040db8891c65382f421e3e.exe 28 PID 2216 wrote to memory of 2352 2216 111edf6657040db8891c65382f421e3e.exe 28 PID 2216 wrote to memory of 2352 2216 111edf6657040db8891c65382f421e3e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\111edf6657040db8891c65382f421e3e.exe"C:\Users\Admin\AppData\Local\Temp\111edf6657040db8891c65382f421e3e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\gazed.exe"C:\Users\Admin\gazed.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD54275baabaff339143256c431932e7dec
SHA140a6191ecfc170bae51b5f2075347cead57a31cc
SHA256207f3bf801cfb7dd90e4e8f5de9e3dc018b2dc981317a8f5e194d1bd40426ce5
SHA5125f9b372812893fae36e436f76dcc4e0b7f2b092edb203a1dbc9fe406f8b513dfc76a77f79582b6d179c6b65b5212d1eaa38146338b567449319c90fd18bee41d