Overview
overview
3Static
static
1GorillaLocomotion.gz
windows7-x64
3GorillaLocomotion.gz
windows10-2004-x64
3archtemp.tar
windows7-x64
3archtemp.tar
windows10-2004-x64
3195efefc38...t.meta
windows7-x64
3195efefc38...t.meta
windows10-2004-x64
3195efefc38...thname
windows7-x64
1195efefc38...thname
windows10-2004-x64
12b537a3c88...t.meta
windows7-x64
32b537a3c88...t.meta
windows10-2004-x64
32b537a3c88...thname
windows7-x64
12b537a3c88...thname
windows10-2004-x64
13b0b8d2763...t.meta
windows7-x64
33b0b8d2763...t.meta
windows10-2004-x64
33b0b8d2763...thname
windows7-x64
13b0b8d2763...thname
windows10-2004-x64
170e84f0f51...t.meta
windows7-x64
370e84f0f51...t.meta
windows10-2004-x64
370e84f0f51...thname
windows7-x64
170e84f0f51...thname
windows10-2004-x64
19a3df7b827.../asset
windows7-x64
19a3df7b827.../asset
windows10-2004-x64
19a3df7b827...t.meta
windows7-x64
39a3df7b827...t.meta
windows10-2004-x64
39a3df7b827...thname
windows7-x64
19a3df7b827...thname
windows10-2004-x64
19fc0d4010b.../asset
windows7-x64
19fc0d4010b.../asset
windows10-2004-x64
19fc0d4010b...t.meta
windows7-x64
39fc0d4010b...t.meta
windows10-2004-x64
39fc0d4010b...thname
windows7-x64
19fc0d4010b...thname
windows10-2004-x64
1Resubmissions
19/04/2024, 10:27
240419-mg9pyaha9t 119/04/2024, 10:26
240419-mggzxsha2w 419/04/2024, 10:21
240419-mdzessfh49 319/04/2024, 10:20
240419-mc639age8x 4Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
GorillaLocomotion.gz
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
GorillaLocomotion.gz
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
archtemp.tar
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
archtemp.tar
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
195efefc3851c8c42ae872c95ce8d146/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
195efefc3851c8c42ae872c95ce8d146/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
195efefc3851c8c42ae872c95ce8d146/pathname
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
195efefc3851c8c42ae872c95ce8d146/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
2b537a3c882d5bc4291656af32de9fda/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
2b537a3c882d5bc4291656af32de9fda/asset.meta
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
2b537a3c882d5bc4291656af32de9fda/pathname
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
2b537a3c882d5bc4291656af32de9fda/pathname
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
3b0b8d276349b7944bca71a3166d2dff/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
3b0b8d276349b7944bca71a3166d2dff/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
3b0b8d276349b7944bca71a3166d2dff/pathname
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
3b0b8d276349b7944bca71a3166d2dff/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
70e84f0f519a82b4ab283375fff56b62/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
70e84f0f519a82b4ab283375fff56b62/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
70e84f0f519a82b4ab283375fff56b62/pathname
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
70e84f0f519a82b4ab283375fff56b62/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/pathname
Resource
win7-20240319-en
Behavioral task
behavioral26
Sample
9a3df7b827ee74f4d9fed6bcc24726ba/pathname
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset.meta
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
9fc0d4010bbf28b4594072e72b8655ab/asset.meta
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
9fc0d4010bbf28b4594072e72b8655ab/pathname
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
9fc0d4010bbf28b4594072e72b8655ab/pathname
Resource
win10v2004-20240412-en
General
-
Target
70e84f0f519a82b4ab283375fff56b62/asset.meta
-
Size
172B
-
MD5
cf222ff7b3b69414cd09ebc264b93a1c
-
SHA1
ebb33cb02c7868da4a7a9705a353ab8ba96cc4ca
-
SHA256
5ca36224319c21fc2ad8cf7ce53257c2370ec530ceb9fd49781144f7204aa3f0
-
SHA512
c4bfc3daacc0b0707bd8df5294d4fd31241c4ce082bfe496e7307acb9d1834bfa1b34f53f95076ff3c0394a665b31e5f6f2ea3f06d257a951ee7d754104dec68
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\meta_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.meta\ = "meta_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\meta_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\meta_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\meta_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\meta_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\meta_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.meta rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2720 AcroRd32.exe 2720 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2684 2868 cmd.exe 29 PID 2868 wrote to memory of 2684 2868 cmd.exe 29 PID 2868 wrote to memory of 2684 2868 cmd.exe 29 PID 2684 wrote to memory of 2720 2684 rundll32.exe 30 PID 2684 wrote to memory of 2720 2684 rundll32.exe 30 PID 2684 wrote to memory of 2720 2684 rundll32.exe 30 PID 2684 wrote to memory of 2720 2684 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\70e84f0f519a82b4ab283375fff56b62\asset.meta1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\70e84f0f519a82b4ab283375fff56b62\asset.meta2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\70e84f0f519a82b4ab283375fff56b62\asset.meta"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b3141a4ed2c285c6488256bec2b0f52d
SHA17f5a01c209975e77be9c24e596bb1de2832f9c45
SHA256c94b0f35e48e0a21aaa747f4ac40b03346a62d55e6ce79a6ed3e3516c1a686e6
SHA512d515e5b27e9048cc364f4ef4e91cf0d7a1f45cb68a1997908f76bfaaad5cee00fad252092762d9d54c0d5579f85eaecc9a38cdff935e54b863a62869257af038