Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
4cd796d40813059763ce0e329f97aaa2.exe
Resource
win7-20240221-en
General
-
Target
4cd796d40813059763ce0e329f97aaa2.exe
-
Size
1.7MB
-
MD5
4cd796d40813059763ce0e329f97aaa2
-
SHA1
e7c982c1d11145379c325c75272d37548a1fab07
-
SHA256
e213bfb7d5b88a2271f0967ff6ce96aeaa1d826fd12d980f35f3ff1119391ac8
-
SHA512
09f7e0f69ab629f0a2f408aca64d32c890ec9d7ff5bb856b19fd9dfe2f857f234ec17ca46d1d1f08a6e25b9f66c5076e94b94703f019933650ec9a71a328d69b
-
SSDEEP
24576:GubsnafAPyjSzIubsnafAPyjZrixzFa3VYeYDi8LzxQevGpDxCENQs3qkMfgWahN:YI4+I1ua3yHiKdhvGpDxes3Sfg7L
Malware Config
Extracted
systembc
67.211.218.147:4001
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2608 work.exe 2744 ogkdraw.exe 2668 gidjgm.exe 2024 gidjgm.exe -
Loads dropped DLL 5 IoCs
pid Process 2940 cmd.exe 2608 work.exe 2608 work.exe 2608 work.exe 2608 work.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 2744 ogkdraw.exe 2744 ogkdraw.exe 2744 ogkdraw.exe 2668 gidjgm.exe 2668 gidjgm.exe 2744 ogkdraw.exe 2668 gidjgm.exe 2744 ogkdraw.exe 2668 gidjgm.exe 2744 ogkdraw.exe 2668 gidjgm.exe 2744 ogkdraw.exe 2668 gidjgm.exe 2744 ogkdraw.exe 2668 gidjgm.exe 2744 ogkdraw.exe 2024 gidjgm.exe 2024 gidjgm.exe 2024 gidjgm.exe 2024 gidjgm.exe 2024 gidjgm.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\gidjgm.job ogkdraw.exe File opened for modification C:\Windows\Tasks\gidjgm.job ogkdraw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2744 ogkdraw.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2744 ogkdraw.exe 2668 gidjgm.exe 2024 gidjgm.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2940 2196 4cd796d40813059763ce0e329f97aaa2.exe 28 PID 2196 wrote to memory of 2940 2196 4cd796d40813059763ce0e329f97aaa2.exe 28 PID 2196 wrote to memory of 2940 2196 4cd796d40813059763ce0e329f97aaa2.exe 28 PID 2196 wrote to memory of 2940 2196 4cd796d40813059763ce0e329f97aaa2.exe 28 PID 2940 wrote to memory of 2608 2940 cmd.exe 30 PID 2940 wrote to memory of 2608 2940 cmd.exe 30 PID 2940 wrote to memory of 2608 2940 cmd.exe 30 PID 2940 wrote to memory of 2608 2940 cmd.exe 30 PID 2608 wrote to memory of 2744 2608 work.exe 31 PID 2608 wrote to memory of 2744 2608 work.exe 31 PID 2608 wrote to memory of 2744 2608 work.exe 31 PID 2608 wrote to memory of 2744 2608 work.exe 31 PID 2444 wrote to memory of 2668 2444 taskeng.exe 33 PID 2444 wrote to memory of 2668 2444 taskeng.exe 33 PID 2444 wrote to memory of 2668 2444 taskeng.exe 33 PID 2444 wrote to memory of 2668 2444 taskeng.exe 33 PID 2444 wrote to memory of 2024 2444 taskeng.exe 36 PID 2444 wrote to memory of 2024 2444 taskeng.exe 36 PID 2444 wrote to memory of 2024 2444 taskeng.exe 36 PID 2444 wrote to memory of 2024 2444 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cd796d40813059763ce0e329f97aaa2.exe"C:\Users\Admin\AppData\Local\Temp\4cd796d40813059763ce0e329f97aaa2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\ogkdraw.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\ogkdraw.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC11366A-09FB-4EE9-BAFD-8A7CF8A968E8} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\ProgramData\tevoch\gidjgm.exeC:\ProgramData\tevoch\gidjgm.exe start22⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
C:\ProgramData\tevoch\gidjgm.exeC:\ProgramData\tevoch\gidjgm.exe start22⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
1.4MB
MD5130a355e9839499e1767866e054f3085
SHA1515f7b83cb9904ff56a6f78984d4b88b0143ea19
SHA2568ff0e9a4b42d001e8040be325f58e48734643e45a11b667587c6d3a4e4fabb8f
SHA5120f3f784464beae138c7ca69948854f95c6d2a36e565e5a177ba615012fa1cb98ba7190e60d32d3f396d8ea2461d6334696c5c59447bbf3438101e2f132e3b592
-
Filesize
1.1MB
MD5d154a07332d28a9bafd5c195905cd5d1
SHA121def1f4997fa810d4634b88f71fc7a15cfe636b
SHA25673be3166d9afd30d63a667a6f956be3670cd6e704605d94ee6db031d9b852f78
SHA5129489d9e984c0da80c3051eb61fbd0a48a95fc5f18a5b0930b4963197aef0d99b425369812f56b9c60ad30ca4dcac9283c6cdcd4e85031975b8b536a1633f20bc