Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 15:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a425733eeb21d5c36bc0b44d52322231.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
a425733eeb21d5c36bc0b44d52322231.exe
Resource
win10v2004-20240221-en
6 signatures
150 seconds
General
-
Target
a425733eeb21d5c36bc0b44d52322231.exe
-
Size
37KB
-
MD5
a425733eeb21d5c36bc0b44d52322231
-
SHA1
178fb392fbec06726986e664e86c3bb8e6f2c8f8
-
SHA256
5594d01a2d3dbd3a2497a3ec0d7bf6a60ee15e77ff72fe29839cb5e5cfaeb40b
-
SHA512
f6472a321f7dd13ba3dd929bc6e38691d76354433bfb9fbecc0daab6a11151f864546650b4552b9c8a6a2e32894282044de7c2b5c789bf490e743e4ba8b8f6c9
-
SSDEEP
384:ZlROwQrII3ONJodCVXMepa3UtSzcD90mblrnI8v:ZmwQh3OnxXOmSE2+I8v
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" a425733eeb21d5c36bc0b44d52322231.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\GiGu.eXe a425733eeb21d5c36bc0b44d52322231.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe a425733eeb21d5c36bc0b44d52322231.exe File created C:\Windows\SysWOW64\GiGu.eml a425733eeb21d5c36bc0b44d52322231.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\uGiG.eXe a425733eeb21d5c36bc0b44d52322231.exe File opened for modification C:\Windows\uGiG.eXe a425733eeb21d5c36bc0b44d52322231.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1216 2820 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 1216 2820 a425733eeb21d5c36bc0b44d52322231.exe 28 PID 2820 wrote to memory of 1216 2820 a425733eeb21d5c36bc0b44d52322231.exe 28 PID 2820 wrote to memory of 1216 2820 a425733eeb21d5c36bc0b44d52322231.exe 28 PID 2820 wrote to memory of 1216 2820 a425733eeb21d5c36bc0b44d52322231.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a425733eeb21d5c36bc0b44d52322231.exe"C:\Users\Admin\AppData\Local\Temp\a425733eeb21d5c36bc0b44d52322231.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 1762⤵
- Program crash
PID:1216
-