Overview
overview
10Static
static
3ggpermV3/A...64.exe
windows11-21h2-x64
1ggpermV3/F...er.bat
windows11-21h2-x64
ggpermV3/L...IS.exe
windows11-21h2-x64
10ggpermV3/N...on.dll
windows11-21h2-x64
1ggpermV3/S...UI.dll
windows11-21h2-x64
1ggpermV3/T...er.exe
windows11-21h2-x64
ggpermV3/a...64.sys
windows11-21h2-x64
1ggpermV3/m...er.bat
windows11-21h2-x64
1ggpermV3/s...er.exe
windows11-21h2-x64
1ggpermV3/s...er.exe
windows11-21h2-x64
1ggpermV3/woof.bat
windows11-21h2-x64
8Analysis
-
max time kernel
1177s -
max time network
1163s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-02-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
ggpermV3/Final_Cleaner.bat
Resource
win11-20240214-en
Behavioral task
behavioral3
Sample
ggpermV3/LAUNCHTHIS.exe
Resource
win11-20240214-en
Behavioral task
behavioral4
Sample
ggpermV3/Newtonsoft.Json.dll
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
ggpermV3/Siticone.UI.dll
Resource
win11-20240214-en
Behavioral task
behavioral6
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win11-20240214-en
Behavioral task
behavioral7
Sample
ggpermV3/amifldrv64.sys
Resource
win11-20240214-en
Behavioral task
behavioral8
Sample
ggpermV3/macchanger.bat
Resource
win11-20240214-en
Behavioral task
behavioral9
Sample
ggpermV3/sxghr-driver.exe
Resource
win11-20240214-en
Behavioral task
behavioral10
Sample
ggpermV3/sxghr-driver.exe
Resource
win11-20240214-en
Behavioral task
behavioral11
Sample
ggpermV3/woof.bat
Resource
win11-20240214-en
General
-
Target
ggpermV3/woof.bat
-
Size
1KB
-
MD5
9dfe4e730dcc5e0d3951038ad2a095a1
-
SHA1
e033d9a40234b9544606ec4d603add264cb38841
-
SHA256
bfffd2faf6710e02912de0eec63b593f35a8bebef114932b4a4bc9c67fad59b8
-
SHA512
297e9950fd207687af957a94c5fb7d073bb89dcebdd6ee047fa0465f55bb95b42563c7310980bf1e41ca671a1f8c824e86dfe515b844f99f307965d199d8dbfd
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 920 sc.exe 3272 sc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3428 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 26 IoCs
Processes:
pid process 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 680 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 4800 svchost.exe Token: SeIncreaseQuotaPrivilege 4800 svchost.exe Token: SeSecurityPrivilege 4800 svchost.exe Token: SeTakeOwnershipPrivilege 4800 svchost.exe Token: SeLoadDriverPrivilege 4800 svchost.exe Token: SeSystemtimePrivilege 4800 svchost.exe Token: SeBackupPrivilege 4800 svchost.exe Token: SeRestorePrivilege 4800 svchost.exe Token: SeShutdownPrivilege 4800 svchost.exe Token: SeSystemEnvironmentPrivilege 4800 svchost.exe Token: SeUndockPrivilege 4800 svchost.exe Token: SeManageVolumePrivilege 4800 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4800 svchost.exe Token: SeIncreaseQuotaPrivilege 4800 svchost.exe Token: SeSecurityPrivilege 4800 svchost.exe Token: SeTakeOwnershipPrivilege 4800 svchost.exe Token: SeLoadDriverPrivilege 4800 svchost.exe Token: SeSystemtimePrivilege 4800 svchost.exe Token: SeBackupPrivilege 4800 svchost.exe Token: SeRestorePrivilege 4800 svchost.exe Token: SeShutdownPrivilege 4800 svchost.exe Token: SeSystemEnvironmentPrivilege 4800 svchost.exe Token: SeUndockPrivilege 4800 svchost.exe Token: SeManageVolumePrivilege 4800 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4800 svchost.exe Token: SeIncreaseQuotaPrivilege 4800 svchost.exe Token: SeSecurityPrivilege 4800 svchost.exe Token: SeTakeOwnershipPrivilege 4800 svchost.exe Token: SeLoadDriverPrivilege 4800 svchost.exe Token: SeSystemtimePrivilege 4800 svchost.exe Token: SeBackupPrivilege 4800 svchost.exe Token: SeRestorePrivilege 4800 svchost.exe Token: SeShutdownPrivilege 4800 svchost.exe Token: SeSystemEnvironmentPrivilege 4800 svchost.exe Token: SeUndockPrivilege 4800 svchost.exe Token: SeManageVolumePrivilege 4800 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4800 svchost.exe Token: SeIncreaseQuotaPrivilege 4800 svchost.exe Token: SeSecurityPrivilege 4800 svchost.exe Token: SeTakeOwnershipPrivilege 4800 svchost.exe Token: SeLoadDriverPrivilege 4800 svchost.exe Token: SeSystemtimePrivilege 4800 svchost.exe Token: SeBackupPrivilege 4800 svchost.exe Token: SeRestorePrivilege 4800 svchost.exe Token: SeShutdownPrivilege 4800 svchost.exe Token: SeSystemEnvironmentPrivilege 4800 svchost.exe Token: SeUndockPrivilege 4800 svchost.exe Token: SeManageVolumePrivilege 4800 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4800 svchost.exe Token: SeIncreaseQuotaPrivilege 4800 svchost.exe Token: SeSecurityPrivilege 4800 svchost.exe Token: SeTakeOwnershipPrivilege 4800 svchost.exe Token: SeLoadDriverPrivilege 4800 svchost.exe Token: SeSystemtimePrivilege 4800 svchost.exe Token: SeBackupPrivilege 4800 svchost.exe Token: SeRestorePrivilege 4800 svchost.exe Token: SeShutdownPrivilege 4800 svchost.exe Token: SeSystemEnvironmentPrivilege 4800 svchost.exe Token: SeUndockPrivilege 4800 svchost.exe Token: SeManageVolumePrivilege 4800 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4800 svchost.exe Token: SeIncreaseQuotaPrivilege 4800 svchost.exe Token: SeSecurityPrivilege 4800 svchost.exe Token: SeTakeOwnershipPrivilege 4800 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exedescription pid process target process PID 3872 wrote to memory of 2296 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 2296 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 2972 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 2972 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 2616 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 2616 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 436 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 436 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 4072 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 4072 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3276 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3276 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 648 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 648 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1172 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1172 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3940 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3940 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3540 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3540 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3580 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3580 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 948 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 948 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1392 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1392 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1536 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1536 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 4608 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 4608 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3548 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3548 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 2608 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 2608 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3008 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3008 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3128 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3128 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3648 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3648 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3704 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3704 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3284 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3284 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 4868 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 4868 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3744 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 3744 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1836 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1836 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1644 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1644 3872 cmd.exe AMIDEWINx64.EXE PID 3872 wrote to memory of 1960 3872 cmd.exe net.exe PID 3872 wrote to memory of 1960 3872 cmd.exe net.exe PID 1960 wrote to memory of 3420 1960 net.exe net1.exe PID 1960 wrote to memory of 3420 1960 net.exe net1.exe PID 3872 wrote to memory of 4088 3872 cmd.exe net.exe PID 3872 wrote to memory of 4088 3872 cmd.exe net.exe PID 4088 wrote to memory of 2288 4088 net.exe net1.exe PID 4088 wrote to memory of 2288 4088 net.exe net1.exe PID 3872 wrote to memory of 920 3872 cmd.exe sc.exe PID 3872 wrote to memory of 920 3872 cmd.exe sc.exe PID 3872 wrote to memory of 3272 3872 cmd.exe sc.exe PID 3872 wrote to memory of 3272 3872 cmd.exe sc.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\woof.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 355940728812193852⤵PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 281511093720530148492⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 260051952727315242⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV 2403715591241236742⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV 291752797517050172242⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS 317371117712674150232⤵PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN 68395008145220232⤵PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO2⤵PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT 693117629329951382⤵PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN 47211659719421632⤵PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 29813131142783892572⤵PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM 1681637659224264552⤵PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP 272091402423929246462⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 24817150213006470842⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF 230641162125084271832⤵PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM 291314170356779732⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP 325962745827188114222⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT 208202515810594165482⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC 260642544422928183692⤵PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM 29373667420588309142⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CT 2771582287559198992⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV 10678243033045136592⤵PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA 22217299121520202572⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CO 1278171901091527512⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK 290252182552142062⤵PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK 211101115320842324672⤵PID:1644
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:3420
-
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:2288
-
-
-
C:\Windows\system32\sc.exesc stop winmgmt2⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\system32\sc.exesc start winmgmt2⤵
- Launches sc.exe
PID:3272
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:3428
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:2464
-