Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
4b72ceffb22961df25fe29ef382135c1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4b72ceffb22961df25fe29ef382135c1.exe
Resource
win10v2004-20231215-en
General
-
Target
4b72ceffb22961df25fe29ef382135c1.exe
-
Size
139KB
-
MD5
4b72ceffb22961df25fe29ef382135c1
-
SHA1
d4427e586c86ad5ac354226dc9214bfe281901d5
-
SHA256
ad0a8a3618651472def7cc38d504df41e80ffc846f46fa335340cdd4484d73ef
-
SHA512
d76879fa4d2b4ede8a1a397b047a4e776e8c9b05320f2b3fa9fe4b0db940f0f62a06c8c87a09aa473e8ab8e217ed8b00eec513a2022fc0070291098f0f01daa1
-
SSDEEP
3072:PnrngFXURgNRurhgZ3NNCbIpNmyuZ0te4aY/GC9bETB5Ldt2193/w:PrgFXUfkY6sH/4aTT2193o
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 4 IoCs
Processes:
4b72ceffb22961df25fe29ef382135c1.exegjgkor.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ewvcc.exe 4b72ceffb22961df25fe29ef382135c1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ewvcc.exe 4b72ceffb22961df25fe29ef382135c1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ewvcc.exe gjgkor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ewvcc.exe gjgkor.exe -
Executes dropped EXE 2 IoCs
Processes:
gjgkor.exegjgkor.exepid process 2604 gjgkor.exe 2484 gjgkor.exe -
Loads dropped DLL 1 IoCs
Processes:
4b72ceffb22961df25fe29ef382135c1.exepid process 3016 4b72ceffb22961df25fe29ef382135c1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
gjgkor.exe4b72ceffb22961df25fe29ef382135c1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\huusgiml = "C:\\Users\\Admin\\AppData\\Local\\gjgkor.exe" gjgkor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\huusgiml = "C:\\Users\\Admin\\AppData\\Local\\gjgkor.exe" 4b72ceffb22961df25fe29ef382135c1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\huusgiml = "C:\\Users\\Admin\\AppData\\Local\\gjgkor.exe" 4b72ceffb22961df25fe29ef382135c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\huusgiml = "C:\\Users\\Admin\\AppData\\Local\\gjgkor.exe" gjgkor.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4b72ceffb22961df25fe29ef382135c1.exegjgkor.exedescription pid process target process PID 2164 set thread context of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2604 set thread context of 2484 2604 gjgkor.exe gjgkor.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
4b72ceffb22961df25fe29ef382135c1.exe4b72ceffb22961df25fe29ef382135c1.exegjgkor.exedescription pid process target process PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 2164 wrote to memory of 3016 2164 4b72ceffb22961df25fe29ef382135c1.exe 4b72ceffb22961df25fe29ef382135c1.exe PID 3016 wrote to memory of 2668 3016 4b72ceffb22961df25fe29ef382135c1.exe netsh.exe PID 3016 wrote to memory of 2668 3016 4b72ceffb22961df25fe29ef382135c1.exe netsh.exe PID 3016 wrote to memory of 2668 3016 4b72ceffb22961df25fe29ef382135c1.exe netsh.exe PID 3016 wrote to memory of 2668 3016 4b72ceffb22961df25fe29ef382135c1.exe netsh.exe PID 3016 wrote to memory of 2604 3016 4b72ceffb22961df25fe29ef382135c1.exe gjgkor.exe PID 3016 wrote to memory of 2604 3016 4b72ceffb22961df25fe29ef382135c1.exe gjgkor.exe PID 3016 wrote to memory of 2604 3016 4b72ceffb22961df25fe29ef382135c1.exe gjgkor.exe PID 3016 wrote to memory of 2604 3016 4b72ceffb22961df25fe29ef382135c1.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe PID 2604 wrote to memory of 2484 2604 gjgkor.exe gjgkor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b72ceffb22961df25fe29ef382135c1.exe"C:\Users\Admin\AppData\Local\Temp\4b72ceffb22961df25fe29ef382135c1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4b72ceffb22961df25fe29ef382135c1.exeC:\Users\Admin\AppData\Local\Temp\4b72ceffb22961df25fe29ef382135c1.exe2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE3⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\gjgkor.exe"C:\Users\Admin\AppData\Local\gjgkor.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\gjgkor.exeC:\Users\Admin\AppData\Local\gjgkor.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\gjgkor.exeFilesize
92KB
MD5585b2c1bbb79580d18d94ec1c8634800
SHA1d36fc2ccd94e38e5bb081d6466e735c8a3f199cc
SHA2560c2e9f5689d7a9a957fc572bc64994602eeca5f884914bd49060ad7fad7024b7
SHA512806c3abbaf1eae41f9a4af9a3333d3b345bb266c0d5cc235bdfa338606fe8b70c64031b2e5f887b3ed19dabc0e50149eff9db04c14343815499c74584a9bf8df
-
\Users\Admin\AppData\Local\gjgkor.exeFilesize
139KB
MD54b72ceffb22961df25fe29ef382135c1
SHA1d4427e586c86ad5ac354226dc9214bfe281901d5
SHA256ad0a8a3618651472def7cc38d504df41e80ffc846f46fa335340cdd4484d73ef
SHA512d76879fa4d2b4ede8a1a397b047a4e776e8c9b05320f2b3fa9fe4b0db940f0f62a06c8c87a09aa473e8ab8e217ed8b00eec513a2022fc0070291098f0f01daa1
-
memory/2164-18-0x0000000001F40000-0x0000000001F50000-memory.dmpFilesize
64KB
-
memory/2164-15-0x0000000001F40000-0x0000000001F50000-memory.dmpFilesize
64KB
-
memory/2164-17-0x0000000001F40000-0x0000000001F50000-memory.dmpFilesize
64KB
-
memory/2484-70-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-77-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-82-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-81-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-80-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-79-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-78-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-73-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-76-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-75-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-69-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-74-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-71-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2484-72-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2604-58-0x0000000001F00000-0x0000000001F10000-memory.dmpFilesize
64KB
-
memory/2604-57-0x0000000001F00000-0x0000000001F10000-memory.dmpFilesize
64KB
-
memory/3016-21-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/3016-12-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/3016-25-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/3016-27-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/3016-28-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/3016-37-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/3016-14-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/3016-19-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB