Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 22:18

General

  • Target

    GinoPlayer.exe

  • Size

    223KB

  • MD5

    d5b35f0e24e7c03c036faf6fca1f624d

  • SHA1

    a0ff20666f5d929663e4c26803b27d574809c923

  • SHA256

    e63b314ab8229891e012ed1cc5d3f8557e7eaa16d01e168b229613064800a903

  • SHA512

    7633a835e925323d7f62e93bca4fe64fe1721a97992ff6c93eb9f9977e8c90b75b3a968c47e8b80aa12999d52f1ff6855f73a91e92ae4c303491a38caa3db223

  • SSDEEP

    3072:JX3hhg694tjSg694tdHoPRR4PKmxsFTbwEfjsPxfbZixPgQZq63hgVg694t8:k5+PX4SYDjZilj

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GinoPlayer.exe
    "C:\Users\Admin\AppData\Local\Temp\GinoPlayer.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 1060
      2⤵
        PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2752-5-0x00000000005F0000-0x00000000005F1000-memory.dmp

      Filesize

      4KB

    • memory/2848-0-0x000007FEF611E000-0x000007FEF611F000-memory.dmp

      Filesize

      4KB

    • memory/2848-1-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2848-2-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2848-3-0x0000000002370000-0x00000000023BA000-memory.dmp

      Filesize

      296KB

    • memory/2848-4-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2848-6-0x000007FEF611E000-0x000007FEF611F000-memory.dmp

      Filesize

      4KB

    • memory/2848-7-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB