Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
385702c5c94ea9deb6eed7e4a21fe380N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
385702c5c94ea9deb6eed7e4a21fe380N.exe
Resource
win10v2004-20240508-en
General
-
Target
385702c5c94ea9deb6eed7e4a21fe380N.exe
-
Size
34KB
-
MD5
385702c5c94ea9deb6eed7e4a21fe380
-
SHA1
b2756d7a39749819e3a7df4bc0d2915008d24860
-
SHA256
7b36fcd2910473cd9fa7e233f8d1ab644162fe7efa6e91ba66367fa19c3d5ef6
-
SHA512
896561f73ec787f8d9afe53418fd498c1feaae9a37f1865c2ece905b2346e04651a3f913801a8023cd5277a48f9e557ab643676b1b65377a8d52168b3d596407
-
SSDEEP
384:y6Lz0OyPaGPbG8FecNrgzbUFPlfRNefMfNq8UQIkWyKWRzpeancfKykJIyfgS9/6:y6Lo1RPbPFHRgzwFPlf/efMTekHdI8W
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
385702c5c94ea9deb6eed7e4a21fe380N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" 385702c5c94ea9deb6eed7e4a21fe380N.exe -
Drops file in System32 directory 3 IoCs
Processes:
385702c5c94ea9deb6eed7e4a21fe380N.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eXe 385702c5c94ea9deb6eed7e4a21fe380N.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe 385702c5c94ea9deb6eed7e4a21fe380N.exe File created C:\Windows\SysWOW64\GiGu.eml 385702c5c94ea9deb6eed7e4a21fe380N.exe -
Drops file in Windows directory 2 IoCs
Processes:
385702c5c94ea9deb6eed7e4a21fe380N.exedescription ioc process File created C:\Windows\uGiG.eXe 385702c5c94ea9deb6eed7e4a21fe380N.exe File opened for modification C:\Windows\uGiG.eXe 385702c5c94ea9deb6eed7e4a21fe380N.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1908 348 WerFault.exe 385702c5c94ea9deb6eed7e4a21fe380N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
385702c5c94ea9deb6eed7e4a21fe380N.exedescription pid process target process PID 348 wrote to memory of 1908 348 385702c5c94ea9deb6eed7e4a21fe380N.exe WerFault.exe PID 348 wrote to memory of 1908 348 385702c5c94ea9deb6eed7e4a21fe380N.exe WerFault.exe PID 348 wrote to memory of 1908 348 385702c5c94ea9deb6eed7e4a21fe380N.exe WerFault.exe PID 348 wrote to memory of 1908 348 385702c5c94ea9deb6eed7e4a21fe380N.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\385702c5c94ea9deb6eed7e4a21fe380N.exe"C:\Users\Admin\AppData\Local\Temp\385702c5c94ea9deb6eed7e4a21fe380N.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 1762⤵
- Program crash
PID:1908
-