Analysis
-
max time kernel
110s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 06:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a2a1a65abac19ad2e7d58fcea6feca90N.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
120 seconds
Behavioral task
behavioral2
Sample
a2a1a65abac19ad2e7d58fcea6feca90N.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
5 signatures
120 seconds
General
-
Target
a2a1a65abac19ad2e7d58fcea6feca90N.exe
-
Size
37KB
-
MD5
a2a1a65abac19ad2e7d58fcea6feca90
-
SHA1
fb270de450ce4ce5cf5c2c31d06c4e30656815e3
-
SHA256
6bef4735a83871547418d85d778918215f5a52c30d28042cce4d9c51e608b1fc
-
SHA512
34dd6a7a76dd62816556551536a7d14b716f210c88f26450d7c9f3d9d1031ce51f7038d1dde1680de4be00753452ae75aa4c5c325452e955d2b43eee026fe94b
-
SSDEEP
384:FPqnByawpTcCW6IQ1JabvEM1FJQHcWXU+K5TtP61vvWO+miu/nI8Aa:/X9I3L1Ikd9qvWldufI87
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a2a1a65abac19ad2e7d58fcea6feca90N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" a2a1a65abac19ad2e7d58fcea6feca90N.exe -
Drops file in System32 directory 3 IoCs
Processes:
a2a1a65abac19ad2e7d58fcea6feca90N.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eXe a2a1a65abac19ad2e7d58fcea6feca90N.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe a2a1a65abac19ad2e7d58fcea6feca90N.exe File created C:\Windows\SysWOW64\GiGu.eml a2a1a65abac19ad2e7d58fcea6feca90N.exe -
Drops file in Windows directory 2 IoCs
Processes:
a2a1a65abac19ad2e7d58fcea6feca90N.exedescription ioc process File opened for modification C:\Windows\uGiG.eXe a2a1a65abac19ad2e7d58fcea6feca90N.exe File created C:\Windows\uGiG.eXe a2a1a65abac19ad2e7d58fcea6feca90N.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2736 2624 WerFault.exe a2a1a65abac19ad2e7d58fcea6feca90N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a2a1a65abac19ad2e7d58fcea6feca90N.exedescription pid process target process PID 2624 wrote to memory of 2736 2624 a2a1a65abac19ad2e7d58fcea6feca90N.exe WerFault.exe PID 2624 wrote to memory of 2736 2624 a2a1a65abac19ad2e7d58fcea6feca90N.exe WerFault.exe PID 2624 wrote to memory of 2736 2624 a2a1a65abac19ad2e7d58fcea6feca90N.exe WerFault.exe PID 2624 wrote to memory of 2736 2624 a2a1a65abac19ad2e7d58fcea6feca90N.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2a1a65abac19ad2e7d58fcea6feca90N.exe"C:\Users\Admin\AppData\Local\Temp\a2a1a65abac19ad2e7d58fcea6feca90N.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 1762⤵
- Program crash
PID:2736
-