Overview
overview
10Static
static
3ggpermV3/A...64.exe
windows10-1703-x64
1ggpermV3/F...er.bat
windows10-1703-x64
1ggpermV3/N...on.dll
windows10-1703-x64
1ggpermV3/S...UI.dll
windows10-1703-x64
1ggpermV3/T...er.exe
windows10-1703-x64
ggpermV3/a...64.sys
windows10-1703-x64
1ggpermV3/g...to.lnk
windows10-1703-x64
3ggpermV3/ggpermV3.exe
windows10-1703-x64
10ggpermV3/m...er.bat
windows10-1703-x64
1ggpermV3/s...er.exe
windows10-1703-x64
1ggpermV3/s...er.exe
windows10-1703-x64
1ggpermV3/woof.bat
windows10-1703-x64
8Resubmissions
22-03-2024 00:33
240322-awglgsff8s 1022-03-2024 00:29
240322-atdrtaff4z 822-03-2024 00:14
240322-ajp24afd9s 10Analysis
-
max time kernel
245s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
22-03-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
ggpermV3/Final_Cleaner.bat
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
ggpermV3/Newtonsoft.Json.dll
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
ggpermV3/Siticone.UI.dll
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
ggpermV3/amifldrv64.sys
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
ggpermV3/ggpermV3 - Acceso directo.lnk
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
ggpermV3/ggpermV3.exe
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
ggpermV3/macchanger.bat
Resource
win10-20240214-en
Behavioral task
behavioral10
Sample
ggpermV3/sxghr-driver.exe
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
ggpermV3/sxghr-driver.exe
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
ggpermV3/woof.bat
Resource
win10-20240221-en
General
-
Target
ggpermV3/woof.bat
-
Size
1KB
-
MD5
9dfe4e730dcc5e0d3951038ad2a095a1
-
SHA1
e033d9a40234b9544606ec4d603add264cb38841
-
SHA256
bfffd2faf6710e02912de0eec63b593f35a8bebef114932b4a4bc9c67fad59b8
-
SHA512
297e9950fd207687af957a94c5fb7d073bb89dcebdd6ee047fa0465f55bb95b42563c7310980bf1e41ca671a1f8c824e86dfe515b844f99f307965d199d8dbfd
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 4732 sc.exe 4688 sc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1572 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 26 IoCs
Processes:
pid process 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 616 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 2572 svchost.exe Token: SeIncreaseQuotaPrivilege 2572 svchost.exe Token: SeSecurityPrivilege 2572 svchost.exe Token: SeTakeOwnershipPrivilege 2572 svchost.exe Token: SeLoadDriverPrivilege 2572 svchost.exe Token: SeSystemtimePrivilege 2572 svchost.exe Token: SeBackupPrivilege 2572 svchost.exe Token: SeRestorePrivilege 2572 svchost.exe Token: SeShutdownPrivilege 2572 svchost.exe Token: SeSystemEnvironmentPrivilege 2572 svchost.exe Token: SeUndockPrivilege 2572 svchost.exe Token: SeManageVolumePrivilege 2572 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2572 svchost.exe Token: SeIncreaseQuotaPrivilege 2572 svchost.exe Token: SeSecurityPrivilege 2572 svchost.exe Token: SeTakeOwnershipPrivilege 2572 svchost.exe Token: SeLoadDriverPrivilege 2572 svchost.exe Token: SeSystemtimePrivilege 2572 svchost.exe Token: SeBackupPrivilege 2572 svchost.exe Token: SeRestorePrivilege 2572 svchost.exe Token: SeShutdownPrivilege 2572 svchost.exe Token: SeSystemEnvironmentPrivilege 2572 svchost.exe Token: SeUndockPrivilege 2572 svchost.exe Token: SeManageVolumePrivilege 2572 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2572 svchost.exe Token: SeIncreaseQuotaPrivilege 2572 svchost.exe Token: SeSecurityPrivilege 2572 svchost.exe Token: SeTakeOwnershipPrivilege 2572 svchost.exe Token: SeLoadDriverPrivilege 2572 svchost.exe Token: SeSystemtimePrivilege 2572 svchost.exe Token: SeBackupPrivilege 2572 svchost.exe Token: SeRestorePrivilege 2572 svchost.exe Token: SeShutdownPrivilege 2572 svchost.exe Token: SeSystemEnvironmentPrivilege 2572 svchost.exe Token: SeUndockPrivilege 2572 svchost.exe Token: SeManageVolumePrivilege 2572 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2572 svchost.exe Token: SeIncreaseQuotaPrivilege 2572 svchost.exe Token: SeSecurityPrivilege 2572 svchost.exe Token: SeTakeOwnershipPrivilege 2572 svchost.exe Token: SeLoadDriverPrivilege 2572 svchost.exe Token: SeSystemtimePrivilege 2572 svchost.exe Token: SeBackupPrivilege 2572 svchost.exe Token: SeRestorePrivilege 2572 svchost.exe Token: SeShutdownPrivilege 2572 svchost.exe Token: SeSystemEnvironmentPrivilege 2572 svchost.exe Token: SeUndockPrivilege 2572 svchost.exe Token: SeManageVolumePrivilege 2572 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2572 svchost.exe Token: SeIncreaseQuotaPrivilege 2572 svchost.exe Token: SeSecurityPrivilege 2572 svchost.exe Token: SeTakeOwnershipPrivilege 2572 svchost.exe Token: SeLoadDriverPrivilege 2572 svchost.exe Token: SeSystemtimePrivilege 2572 svchost.exe Token: SeBackupPrivilege 2572 svchost.exe Token: SeRestorePrivilege 2572 svchost.exe Token: SeShutdownPrivilege 2572 svchost.exe Token: SeSystemEnvironmentPrivilege 2572 svchost.exe Token: SeUndockPrivilege 2572 svchost.exe Token: SeManageVolumePrivilege 2572 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2572 svchost.exe Token: SeIncreaseQuotaPrivilege 2572 svchost.exe Token: SeSecurityPrivilege 2572 svchost.exe Token: SeTakeOwnershipPrivilege 2572 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exedescription pid process target process PID 4432 wrote to memory of 4800 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4800 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3080 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3080 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4160 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4160 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 704 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 704 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4560 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4560 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 1052 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 1052 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3248 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3248 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3968 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3968 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4612 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4612 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4616 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4616 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4760 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4760 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4596 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4596 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 216 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 216 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 1668 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 1668 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 828 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 828 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 212 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 212 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 2800 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 2800 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4396 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4396 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4820 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4820 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 2664 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 2664 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3012 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3012 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3588 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3588 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3056 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3056 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4640 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4640 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3604 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 3604 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4920 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4920 4432 cmd.exe AMIDEWINx64.EXE PID 4432 wrote to memory of 4316 4432 cmd.exe net.exe PID 4432 wrote to memory of 4316 4432 cmd.exe net.exe PID 4316 wrote to memory of 4268 4316 net.exe net1.exe PID 4316 wrote to memory of 4268 4316 net.exe net1.exe PID 4432 wrote to memory of 2148 4432 cmd.exe net.exe PID 4432 wrote to memory of 2148 4432 cmd.exe net.exe PID 2148 wrote to memory of 1524 2148 net.exe net1.exe PID 2148 wrote to memory of 1524 2148 net.exe net1.exe PID 4432 wrote to memory of 4688 4432 cmd.exe sc.exe PID 4432 wrote to memory of 4688 4432 cmd.exe sc.exe PID 4432 wrote to memory of 4732 4432 cmd.exe sc.exe PID 4432 wrote to memory of 4732 4432 cmd.exe sc.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\woof.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 239102185819056115712⤵PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 297832894525372307872⤵PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 19240242842977085272⤵PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV 300831575821544199962⤵PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV 187263040117781306512⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS 2225891242284154812⤵PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN 31295120286324283392⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO2⤵PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT 29299226332964227502⤵PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN 150593197928267254772⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 52731859611615144682⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM 305341379230500130772⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP 233533208231783292412⤵PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 47372345611788272262⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF 9200205154955148942⤵PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM 2366414568886181422⤵PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP 27142866624271254482⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT 627719939597518582⤵PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC 30684136807482225922⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM 5172325396929992⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CT 162841825729367253152⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV 198292609914217180542⤵PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA 2035638692888178742⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CO 10565951224697318812⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK 28034321371979193152⤵PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK 14885750626142219362⤵PID:4920
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:4268
-
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:1524
-
-
-
C:\Windows\system32\sc.exesc stop winmgmt2⤵
- Launches sc.exe
PID:4688
-
-
C:\Windows\system32\sc.exesc start winmgmt2⤵
- Launches sc.exe
PID:4732
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:1572
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:4220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:4612
-