Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 22:44

General

  • Target

    GoKuai.exe

  • Size

    1.2MB

  • MD5

    240c9efcd0f922441867ca8d74393404

  • SHA1

    83a3bf0aaad0c5f5708839e08d3f85db09106da0

  • SHA256

    50645a3f7d709269fc22f1e1f27203ebb1b75551a251442b2189b71cc4f039c2

  • SHA512

    30c7609dc64778fc257a8455d68ad1619f1149a7b088af11ed7b256eb15c484b474154f8033e910fd828c0cd7b0ca37ae1522768e7db3ee9153cb02a8970919b

  • SSDEEP

    24576:U5pd8sAT/whnGsv9ZR/d879exaIJKmLKjULpZ2XHxWow2bSzGpVf2hQpUOuLT0oW:upd8sADwhnGsv9ZR/d87oxnKSKjKU3kY

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GoKuai.exe
    "C:\Users\Admin\AppData\Local\Temp\GoKuai.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads