Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
goggle.com trojan.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
goggle.com trojan.exe
Resource
win10v2004-20240426-en
General
-
Target
goggle.com trojan.exe
-
Size
18.1MB
-
MD5
cde9ef7ddb7296fcfb8e1212b91c2eb0
-
SHA1
ff642c027aaf198356d5878db24ec9d0aec03118
-
SHA256
361c5ca1db8ea24f3a773cddcddbcbaebd845432dcd12e180bfd975114366f28
-
SHA512
45bdf680fab9883c8d42e7258efdfdb74e2a0502a999055f5f4c8fbac87b0f4666ade841d5aab7cbccff10897de75b0cbc33fef4f3f1963d5c1c30704119d616
-
SSDEEP
393216:9SiyEBhx7QN5oXE45QhcrOXHdHiLCgfWwI:9SibhxU545Qj3sLCgfBI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exegoggle.com trojan.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation goggle.com trojan.exe -
Executes dropped EXE 1 IoCs
Processes:
anr0129.exepid process 3508 anr0129.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RarSFX0\anr0129.exe upx behavioral2/memory/3508-318-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/3508-321-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
anr0129.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows installer = "C:\\winstall.exe" anr0129.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
anr0129.exepid process 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
anr0129.exepid process 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe 3508 anr0129.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 2684 cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
goggle.com trojan.execmd.exedescription pid process target process PID 2872 wrote to memory of 2684 2872 goggle.com trojan.exe cmd.exe PID 2872 wrote to memory of 2684 2872 goggle.com trojan.exe cmd.exe PID 2872 wrote to memory of 2684 2872 goggle.com trojan.exe cmd.exe PID 2684 wrote to memory of 3508 2684 cmd.exe anr0129.exe PID 2684 wrote to memory of 3508 2684 cmd.exe anr0129.exe PID 2684 wrote to memory of 3508 2684 cmd.exe anr0129.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\goggle.com trojan.exe"C:\Users\Admin\AppData\Local\Temp\goggle.com trojan.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Blaster.bat" "2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\anr0129.exe"anr0129.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Blaster.batFilesize
50B
MD56a83b03054f53cb002fdca262b76b102
SHA11bbafe19ae5bcdd4f3710f13d06332128a5d54f7
SHA2567952248cb4ec97bc0d2ab3b51c126c7b0704a7f9d42bddf6adcb04b5657c7a4e
SHA512fa8d907bb187f32de1cfbe1b092982072632456fd429e4dd92f62e482f2ad23e602cf845a2fd655d0e4b8314c1d7a086dc9545d4d82996afbccb364ddc1e9eae
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\anr0129.exeFilesize
16KB
MD5eb790be93afb8481cfc43515b00976ab
SHA13e2a4c1393f7c09e5c1ae989aea0eb1d3b8c1e6d
SHA256f6dec10d8bc56fc09673e544007654553c99848c8a211c64dbee0758ec9ddbd2
SHA5126604a81c584bba8fcd4b96b895f29d43b311c99bcfb5065300d1f3f423b1857ce9faacea6d54e0e7b624c3c5aed1b4037ddae130e8b3499e9aca5ae4b8dcd99a
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\fun (1).exeFilesize
116KB
MD58a84d8b3c4044c3f4eca7127d1cad349
SHA1e3c9335b805c858bae6d64d176fcc259fa4f12ee
SHA2567f27eac0d3e5ce33ba5dea3a0dcd07e33e7ba9b9f5783abe99d20eba9f783bd3
SHA512fc019f613c9167ca3832e5ab4a798f8d441930f1bba246d5901a12ad36e410bab2be1b467b82aaacb57250b0eb887dc6d26265f6f4b783c937f951a3548f8879
-
memory/3508-318-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/3508-321-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB