Analysis

  • max time kernel
    313s
  • max time network
    1593s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/08/2024, 22:47 UTC

General

  • Target

    gasai.rar

  • Size

    131.2MB

  • MD5

    2e7a8f36236fd45417b2213d0768fa43

  • SHA1

    61ff5dc5ad0981857f5f212fe93742aef33960ae

  • SHA256

    11438a5e03ababdc7aa308a1c82fb1685c58bb0d4b0a7e3b0a2af7a3c28b62f4

  • SHA512

    38254324ef2a2ae591eb8c7618517dc824bc3cde4a709da8a798ab75ddcf711a35bdc85624d47ac693bb3da14193f2ca461163c1b38fa0c4c3a6aa41f68dc9f1

  • SSDEEP

    3145728:Q8s3kUCgZPG1eftBScfPn6MnvvxjgV6QfETIUjlTH7Shb:Q8s3kBkOIfZnjvxUV6QQIUxSh

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\gasai.rar
    1⤵
    • Modifies registry class
    PID:2668
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1936
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3612

    Network

    • flag-us
      DNS
      11.227.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      11.227.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      8.173.189.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.173.189.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      8.173.189.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.173.189.20.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      44.56.20.217.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      44.56.20.217.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • 138.91.171.81:80
      104 B
      2
    • 8.8.8.8:53
      11.227.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      11.227.111.52.in-addr.arpa

    • 8.8.8.8:53
      8.173.189.20.in-addr.arpa
      dns
      142 B
      157 B
      2
      1

      DNS Request

      8.173.189.20.in-addr.arpa

      DNS Request

      8.173.189.20.in-addr.arpa

    • 8.8.8.8:53
      44.56.20.217.in-addr.arpa
      dns
      71 B
      131 B
      1
      1

      DNS Request

      44.56.20.217.in-addr.arpa

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.