Analysis
-
max time kernel
112s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
96161c05b0a77109a14f40d98e9dd9d6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
96161c05b0a77109a14f40d98e9dd9d6.exe
Resource
win10v2004-20231215-en
General
-
Target
96161c05b0a77109a14f40d98e9dd9d6.exe
-
Size
64KB
-
MD5
96161c05b0a77109a14f40d98e9dd9d6
-
SHA1
e80438e8fe21a523aa1c51635df0f4b8653a6199
-
SHA256
5790197a67a3ff0dea89b128a704fe0f6e16df95509ffa972cf95d69792539c8
-
SHA512
7018b96248b375ab59649c8d7a09274bb6b3bbf8405b00b60f103f180248f8a9fa00ae021f3cc0124d107c54e56a64b86f6a126cc672c0a3ba52737671eeb343
-
SSDEEP
1536:JkJTckW3JJd2urOrJZo+ikVDE1qbmlfnESu:JkWOuar5lDbqdEp
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gtcjqfqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\aPSDhw1GND = "C:\\ProgramData\\ergradux\\gtcjqfqz.exe" gtcjqfqz.exe -
Executes dropped EXE 1 IoCs
pid Process 5060 gtcjqfqz.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3780 96161c05b0a77109a14f40d98e9dd9d6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3780 wrote to memory of 5060 3780 96161c05b0a77109a14f40d98e9dd9d6.exe 94 PID 3780 wrote to memory of 5060 3780 96161c05b0a77109a14f40d98e9dd9d6.exe 94 PID 3780 wrote to memory of 5060 3780 96161c05b0a77109a14f40d98e9dd9d6.exe 94 PID 3780 wrote to memory of 3124 3780 96161c05b0a77109a14f40d98e9dd9d6.exe 95 PID 3780 wrote to memory of 3124 3780 96161c05b0a77109a14f40d98e9dd9d6.exe 95 PID 3780 wrote to memory of 3124 3780 96161c05b0a77109a14f40d98e9dd9d6.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\96161c05b0a77109a14f40d98e9dd9d6.exe"C:\Users\Admin\AppData\Local\Temp\96161c05b0a77109a14f40d98e9dd9d6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\ProgramData\ergradux\gtcjqfqz.exeC:\ProgramData\ergradux\gtcjqfqz.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:5060
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\96161C~1.EXE.bak >> NUL2⤵PID:3124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD596161c05b0a77109a14f40d98e9dd9d6
SHA1e80438e8fe21a523aa1c51635df0f4b8653a6199
SHA2565790197a67a3ff0dea89b128a704fe0f6e16df95509ffa972cf95d69792539c8
SHA5127018b96248b375ab59649c8d7a09274bb6b3bbf8405b00b60f103f180248f8a9fa00ae021f3cc0124d107c54e56a64b86f6a126cc672c0a3ba52737671eeb343