Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe
Resource
win10v2004-20240426-en
General
-
Target
44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe
-
Size
53KB
-
MD5
9b4a7f66605dec7e82869ffc215105eb
-
SHA1
9cb3601386cb10ced226d91b6f43113f885d653a
-
SHA256
44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234
-
SHA512
89ca5a205df2424734774776eed035f681ed318abafc0ea0039b511f947849c58e9d94d084018d8e74a84618a61fc54252a32b868a9d9821e56955256cfd8c6e
-
SSDEEP
1536:vNyg8r8QLzRWQi7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:GRWjJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
goeuge.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" goeuge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe -
Executes dropped EXE 1 IoCs
Processes:
goeuge.exepid process 3168 goeuge.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
goeuge.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goeuge = "C:\\Users\\Admin\\goeuge.exe" goeuge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
goeuge.exepid process 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe 3168 goeuge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exegoeuge.exepid process 3136 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe 3168 goeuge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exegoeuge.exedescription pid process target process PID 3136 wrote to memory of 3168 3136 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe goeuge.exe PID 3136 wrote to memory of 3168 3136 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe goeuge.exe PID 3136 wrote to memory of 3168 3136 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe goeuge.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe PID 3168 wrote to memory of 3136 3168 goeuge.exe 44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe"C:\Users\Admin\AppData\Local\Temp\44516cf857ffa6c0670d5a98f00c7b7a1ab8205cd18fd892926e07557c2a1234.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\goeuge.exe"C:\Users\Admin\goeuge.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD59049dec19c5c7d43206435b05f3a5779
SHA190937f9c46c1d8952aca742f12e84e0d1f70a2b5
SHA2569b135b32adc51094b12a2feb1a0b25f6a5f44c4af12c30638169b7d9c18c796c
SHA512dbac61c264e1365973adb91b2be8ab5f2c7e362ded6d880a5e438db281596c562c7bd705be95fa198730b457936e6e17fbe110fac17dd3cfea54ca49398daf8f