Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe
Resource
win10v2004-20240221-en
General
-
Target
2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe
-
Size
2.0MB
-
MD5
273b0d2634b3d34a25362054f0667c3c
-
SHA1
1545fbb6a47e03c2b12063b8bb56e759be048711
-
SHA256
2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3
-
SHA512
875892a7da8aab628c532e62a6d465d15b301b2051f1e016d0155912862a2483b1fa7361ee3ec28dcd733e2de9b1bb79d3712c85762d4cdb76eec194b55de061
-
SSDEEP
24576:x2JyxpC4V1y2I6VsjgjI45bl9Mbonwap41+zzPTThwv3EJp:Ak3Cy1L/VsjgjI45TMwwapIgT5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3264 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.tmp 3540 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm 5932 GOG.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm Set value (str) \REGISTRY\USER\S-1-5-21-2132103209-3755304320-2959162027-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" GOG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2132103209-3755304320-2959162027-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" GOG.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened (read-only) \??\B: 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\GOG.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm File opened for modification C:\Windows\GOG.exe 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm File created C:\Windows\GOG.exe GOG.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2\NowCount = "0" GOG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2 GOG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2\WinX = "1" GOG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe 316 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe 5932 GOG.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 316 wrote to memory of 3264 316 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe 86 PID 316 wrote to memory of 3264 316 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe 86 PID 316 wrote to memory of 3540 316 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe 87 PID 316 wrote to memory of 3540 316 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe 87 PID 316 wrote to memory of 3540 316 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe 87 PID 3540 wrote to memory of 5932 3540 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm 91 PID 3540 wrote to memory of 5932 3540 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm 91 PID 3540 wrote to memory of 5932 3540 2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe"C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.tmpC:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.tmp2⤵
- Executes dropped EXE
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mmC:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm /zhj2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\GOG.exeC:\Windows\GOG.exe /zhj3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm
Filesize448KB
MD52f27ad0f9238059fefebf8c12b203ca6
SHA1df95aa09aa7d473e3ff63d7bc983b1c737291ca3
SHA2569c447d77d39ad42459d7584818929b0ac19f17aa079f57fba1df031a4896bb37
SHA5123e7b6c41f92dd47d4ee28596a69b7a9608ea713b226675fc8506db6db185a6b081361e6c98778f40f776bd56f37f02d761f6eddde1abe081c2eb5bcb55a9c963
-
C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.tmp
Filesize1.6MB
MD57be1cbe3357f110cd18e7af2db40f03f
SHA1c36bd53bd5a286b71f4ee8ad75a95c3e7a66cf77
SHA25652452d8cceba90889cf11e9ac12be930839606196fd61f0dc7da98c694d9d5e4
SHA512c639b8716a27a54898ead7af006c0bf0494820ad9ca1f7d6a75f8b08a8c8ed98bb7bb62ec99faa7af40b5ccafe38a672502cbd576f8b496f79bebdf0f8a0e9f7