Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 15:27

General

  • Target

    07e98c92e1f9859a16b31df6aa5bc83c0d11d4f5f9d8a8ce5d7ddc1a0655a73b.exe

  • Size

    394KB

  • MD5

    92117db6e028061b49507c9538a19a79

  • SHA1

    82e2a0ae177ea236133f9c20843d686a9844fb44

  • SHA256

    07e98c92e1f9859a16b31df6aa5bc83c0d11d4f5f9d8a8ce5d7ddc1a0655a73b

  • SHA512

    47a9beffae3da3173d3f7faa61965cb3128a7b8643d5cb32ff8251c8e1d3d88874814f906770008d7df14036d0865bbd09422d1fb8d42a17bc042764595c0f17

  • SSDEEP

    6144:8dKBBpxQSZrRe1pWmYTCZvCeatD5+BLjVWA2oN+zffGvmH9fr334YaC7I20PY:8dKBHw8mYmtw5+5jX2oNwGvYj334YaC7

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Executes dropped EXE 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07e98c92e1f9859a16b31df6aa5bc83c0d11d4f5f9d8a8ce5d7ddc1a0655a73b.exe
    "C:\Users\Admin\AppData\Local\Temp\07e98c92e1f9859a16b31df6aa5bc83c0d11d4f5f9d8a8ce5d7ddc1a0655a73b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Public\dez.exe
      "C:\Users\Public\dez.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8964.tmp\Desativar Gerenciador de Tarefas.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:620
        • C:\Windows\SysWOW64\reg.exe
          reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f
          4⤵
            PID:4992
      • C:\Users\Admin\AppData\Roaming\Local\Gogle\update\goupdate.exe
        "C:\Users\Admin\AppData\Roaming\Local\Gogle\update\goupdate.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:3404
      • C:\Users\Admin\AppData\Roaming\Local\Gogle\update\winupdate.exe
        "C:\Users\Admin\AppData\Roaming\Local\Gogle\update\winupdate.exe"
        2⤵
        • Executes dropped EXE
        PID:4772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      192B

      MD5

      629ff8f9eb9236dd4b295bd345e576e3

      SHA1

      06fe374759069a5b2720e753bf7918a27254fdbe

      SHA256

      16d32ebdf19663e509906249243c7aa8621dc1f9b3b748363407cbdc311f2473

      SHA512

      3540b7cb0a5d65aaf10ae5950a62dbdb76f7ee291f2d8907f8bd18c0bd148fc30131edc5f20d446fe5ca08120f6fa56dd6a5525f8cccbdbd48b8e25ffc6ca6e6

    • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

      Filesize

      192B

      MD5

      5a24d554628b02753abd2408dfbbf5f2

      SHA1

      340b61e45be0137f6f743ca51f576b8f904b5eb2

      SHA256

      c3ce81b7c615dbf3e730e14869ffd86750ceb6b16e6bd1aaadb1ff6f428ed117

      SHA512

      fe9a93e443794e61d89d0d4d3058d8757c70075dfdfaf16e7442e75ec039ec257eecc84b9e2a242c1c1afe872fc0d365ddd4e98d98ba32cfd573b31395ddc7d0

    • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

      Filesize

      48B

      MD5

      3ebc4be50e46329120d8cbe37bbaf7d2

      SHA1

      27564b7bb466148f2fda9f770c8d00794e8dc2fb

      SHA256

      307e234769167f7a9b264e16b1b1e2a8162aebab0f96cb74c0afbe9912736677

      SHA512

      9d8292fab5f0218823c72f322028e7e900d16d53364a689bf4433cdd581bda2f8b4626c89757c028d8cf6f7e104c7e7210dedb34be61917e79575b7912fcbddc

    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\osmia32.msi

      Filesize

      3.0MB

      MD5

      a1c04e4e4860950df247bfb53be6a209

      SHA1

      7357a6aa3ca24213788d792eccfc7c6efdaaf823

      SHA256

      331f262a22d1042edc8ab152b3aa351bec2497cd7911a89d3106d991e988fc8b

      SHA512

      194d5e017278091cbb97ce9d5be61fce8711e6485f5566fc0c7993a7fbe1d86b050d2c8b29174eaf2fd86a012df5c557addbbd3b68d0f8fc52d18153c69ec535

    • C:\Users\Admin\AppData\Local\Temp\8964.tmp\Desativar Gerenciador de Tarefas.bat

      Filesize

      143B

      MD5

      957cc733dc4b598cc6c46a853edc1f09

      SHA1

      3bca6a4b7813d80edb21b398703f892266361ec0

      SHA256

      6783af457832da1f302f28a506ca89fc34a33e698ca6d0060db1117f195fa31a

      SHA512

      d937f5f2b13c71139e683a290474d6f431f7fc3a0e680ce3c7468b91e400354ccb0c2f35864d04480d02829ac01657be6504102ba24fd99fb4da2fc83ceb952f

    • C:\Users\Admin\AppData\Roaming\### DECRYPT MY FILES ###11.$$A

      Filesize

      38KB

      MD5

      c1a0b66678bf454bd5f898cd8cbd61c0

      SHA1

      e6b02a25dbd7fb7d16753553f0cd8098ee31e82b

      SHA256

      93f234714729fae7d3fc30c27244d7ca071d7afca88cf0ce8b0c2a6005d68a22

      SHA512

      7d5c36724b532a7edff594ff7a5731672769a6ef04cb69fba20ab691ffac6d24e2a4432f4585da1413efee6d3c4d604ad06e78dfe04618a5b43cc44c7c5106cf

    • C:\Users\Admin\AppData\Roaming\Local\Gogle\update\goupdate.exe

      Filesize

      36KB

      MD5

      a4046a44b24f172d662e01bd05ac046b

      SHA1

      40b6be7ca7716c6a107880c255cc580d66e9aa1e

      SHA256

      84dbac99652bff87ee745517847be494db142ee37d9ea9a75af7d0f24f134d88

      SHA512

      fc3ab78e175a355461423f8b8c721f737cbac80e9f0217cebee8718ee5e30a101013d1b7414f6ad88e602b923a3deeeacd847226e50b6bb6394c3ff02d096728

    • C:\Users\Admin\AppData\Roaming\Local\Gogle\update\winupdate.exe

      Filesize

      36KB

      MD5

      1fe057e3e833bced7feb0164e6302751

      SHA1

      e13881478c59a46b81c3a7819e5d48ebb584c9fb

      SHA256

      653511eacc5465aa720eb9c303caa3b37133a05407d0d41517cc1412258e59eb

      SHA512

      a278886f9b39958526b45afcc95c71d53a281446608e3839db4c7fedb05717372ab5223e3e1dd3d824651d1eb0320b963208e1d6859976b8f8cba0de76a01132

    • C:\Users\Public\dez.exe

      Filesize

      25KB

      MD5

      4deb15ef2bceff8aa06607fb1437da82

      SHA1

      43e9393398f176f90653b7c1f812c358bac58804

      SHA256

      4a4b5b52f64a8dd059c74b56335b0023d1a731c6436d4b5e2d46613f30662859

      SHA512

      e54066f24acb5837d1289ab731b0c631fe54068f170cd03023f99ba6ede1d9e31a54944e1ecd47dca4b3a441866f086353652f9c05cc4651ce7c5f428f1028bf

    • memory/1740-55-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1740-50-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1740-45-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/3404-54-0x0000000000DE0000-0x0000000000DEE000-memory.dmp

      Filesize

      56KB

    • memory/3404-60-0x0000000005750000-0x00000000057E2000-memory.dmp

      Filesize

      584KB

    • memory/3404-56-0x0000000074530000-0x0000000074CE0000-memory.dmp

      Filesize

      7.7MB

    • memory/3404-305-0x0000000074530000-0x0000000074CE0000-memory.dmp

      Filesize

      7.7MB

    • memory/3404-59-0x0000000005C60000-0x0000000006204000-memory.dmp

      Filesize

      5.6MB

    • memory/3404-64-0x0000000005920000-0x0000000005930000-memory.dmp

      Filesize

      64KB

    • memory/3404-65-0x00000000056B0000-0x00000000056BA000-memory.dmp

      Filesize

      40KB

    • memory/3404-310-0x0000000005920000-0x0000000005930000-memory.dmp

      Filesize

      64KB

    • memory/4772-63-0x000000001C8A0000-0x000000001C93C000-memory.dmp

      Filesize

      624KB

    • memory/4772-68-0x0000000001550000-0x0000000001560000-memory.dmp

      Filesize

      64KB

    • memory/4772-67-0x000000001CA00000-0x000000001CA4C000-memory.dmp

      Filesize

      304KB

    • memory/4772-306-0x0000000001550000-0x0000000001560000-memory.dmp

      Filesize

      64KB

    • memory/4772-307-0x00007FFC85E80000-0x00007FFC86821000-memory.dmp

      Filesize

      9.6MB

    • memory/4772-66-0x000000001BDA0000-0x000000001BDA8000-memory.dmp

      Filesize

      32KB

    • memory/4772-311-0x0000000001550000-0x0000000001560000-memory.dmp

      Filesize

      64KB

    • memory/4772-62-0x000000001C280000-0x000000001C74E000-memory.dmp

      Filesize

      4.8MB

    • memory/4772-61-0x00007FFC85E80000-0x00007FFC86821000-memory.dmp

      Filesize

      9.6MB

    • memory/4772-352-0x0000000001550000-0x0000000001560000-memory.dmp

      Filesize

      64KB

    • memory/4772-58-0x0000000001550000-0x0000000001560000-memory.dmp

      Filesize

      64KB

    • memory/4772-57-0x000000001BCD0000-0x000000001BD76000-memory.dmp

      Filesize

      664KB