Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 19:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c172a633f244dd1c67035715ecb9a4e9.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
c172a633f244dd1c67035715ecb9a4e9.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
c172a633f244dd1c67035715ecb9a4e9.exe
-
Size
37KB
-
MD5
c172a633f244dd1c67035715ecb9a4e9
-
SHA1
e2bf15a024b6d0a88752401d53e047e39bb1e4cd
-
SHA256
1b1af1ddd18e0504348074fa8f969c5f657f8e5390c5e054a10cf28d8d52bd98
-
SHA512
9ee7591e45ccc90f2083b0b832bf7906b68d62823113f0fae687ca2c6a60320eefea024fcb871cf6df9048abb4ce79de55cabe024ecaf2693b7975937d3f9ff8
-
SSDEEP
384:qV4jRGBhOry47SDH02Ijd5vrf6DelcTKmpY2vnqwxX6lBdhoHnI8vuu:BRO0rEDAjdhrf6Del/yDvnqwF67MI8
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c172a633f244dd1c67035715ecb9a4e9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" c172a633f244dd1c67035715ecb9a4e9.exe -
Drops file in System32 directory 3 IoCs
Processes:
c172a633f244dd1c67035715ecb9a4e9.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eXe c172a633f244dd1c67035715ecb9a4e9.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe c172a633f244dd1c67035715ecb9a4e9.exe File created C:\Windows\SysWOW64\GiGu.eml c172a633f244dd1c67035715ecb9a4e9.exe -
Drops file in Windows directory 2 IoCs
Processes:
c172a633f244dd1c67035715ecb9a4e9.exedescription ioc process File created C:\Windows\uGiG.eXe c172a633f244dd1c67035715ecb9a4e9.exe File opened for modification C:\Windows\uGiG.eXe c172a633f244dd1c67035715ecb9a4e9.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2132 2340 WerFault.exe c172a633f244dd1c67035715ecb9a4e9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c172a633f244dd1c67035715ecb9a4e9.exedescription pid process target process PID 2340 wrote to memory of 2132 2340 c172a633f244dd1c67035715ecb9a4e9.exe WerFault.exe PID 2340 wrote to memory of 2132 2340 c172a633f244dd1c67035715ecb9a4e9.exe WerFault.exe PID 2340 wrote to memory of 2132 2340 c172a633f244dd1c67035715ecb9a4e9.exe WerFault.exe PID 2340 wrote to memory of 2132 2340 c172a633f244dd1c67035715ecb9a4e9.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c172a633f244dd1c67035715ecb9a4e9.exe"C:\Users\Admin\AppData\Local\Temp\c172a633f244dd1c67035715ecb9a4e9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 1762⤵
- Program crash
PID:2132
-