Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
GJecwa34.cpl.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GJecwa34.cpl.exe
Resource
win10v2004-20240802-en
General
-
Target
GJecwa34.cpl.exe
-
Size
873KB
-
MD5
5b2ac6ed9b0830ec7f1c9eb7deb38c66
-
SHA1
0f1011748dfff6a0d0f0c0b9b8bc045da54080a6
-
SHA256
92ac711db16da541e06c5195050f6fbd8915255c79ded58f70ba030d37135ceb
-
SHA512
d1509fbdf410c943b2df1f05f1ece680dbd45b6090b43985707f6ebccf940cf4d384a235838d75df8f72b688c41fbfc0ef41347dee869de2d7e3dd5aa1da68f8
-
SSDEEP
24576:QLVxajaoPDR60nXKJxrYUrG/fNfhgsqYREh3TR:Q/b3MNJgsqYRed
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt GJecwa34.cpl.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt GJecwa34.cpl.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GJecwa34.cpl.exe" GJecwa34.cpl.exe -
Drops desktop.ini file(s) 10 IoCs
description ioc Process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini GJecwa34.cpl.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GJecwa34.cpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2220 cmd.exe 1940 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1940 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2108 GJecwa34.cpl.exe 2108 GJecwa34.cpl.exe 2108 GJecwa34.cpl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1544 wmic.exe Token: SeSecurityPrivilege 1544 wmic.exe Token: SeTakeOwnershipPrivilege 1544 wmic.exe Token: SeLoadDriverPrivilege 1544 wmic.exe Token: SeSystemProfilePrivilege 1544 wmic.exe Token: SeSystemtimePrivilege 1544 wmic.exe Token: SeProfSingleProcessPrivilege 1544 wmic.exe Token: SeIncBasePriorityPrivilege 1544 wmic.exe Token: SeCreatePagefilePrivilege 1544 wmic.exe Token: SeBackupPrivilege 1544 wmic.exe Token: SeRestorePrivilege 1544 wmic.exe Token: SeShutdownPrivilege 1544 wmic.exe Token: SeDebugPrivilege 1544 wmic.exe Token: SeSystemEnvironmentPrivilege 1544 wmic.exe Token: SeRemoteShutdownPrivilege 1544 wmic.exe Token: SeUndockPrivilege 1544 wmic.exe Token: SeManageVolumePrivilege 1544 wmic.exe Token: 33 1544 wmic.exe Token: 34 1544 wmic.exe Token: 35 1544 wmic.exe Token: SeIncreaseQuotaPrivilege 1544 wmic.exe Token: SeSecurityPrivilege 1544 wmic.exe Token: SeTakeOwnershipPrivilege 1544 wmic.exe Token: SeLoadDriverPrivilege 1544 wmic.exe Token: SeSystemProfilePrivilege 1544 wmic.exe Token: SeSystemtimePrivilege 1544 wmic.exe Token: SeProfSingleProcessPrivilege 1544 wmic.exe Token: SeIncBasePriorityPrivilege 1544 wmic.exe Token: SeCreatePagefilePrivilege 1544 wmic.exe Token: SeBackupPrivilege 1544 wmic.exe Token: SeRestorePrivilege 1544 wmic.exe Token: SeShutdownPrivilege 1544 wmic.exe Token: SeDebugPrivilege 1544 wmic.exe Token: SeSystemEnvironmentPrivilege 1544 wmic.exe Token: SeRemoteShutdownPrivilege 1544 wmic.exe Token: SeUndockPrivilege 1544 wmic.exe Token: SeManageVolumePrivilege 1544 wmic.exe Token: 33 1544 wmic.exe Token: 34 1544 wmic.exe Token: 35 1544 wmic.exe Token: SeBackupPrivilege 1708 vssvc.exe Token: SeRestorePrivilege 1708 vssvc.exe Token: SeAuditPrivilege 1708 vssvc.exe Token: SeIncreaseQuotaPrivilege 2096 wmic.exe Token: SeSecurityPrivilege 2096 wmic.exe Token: SeTakeOwnershipPrivilege 2096 wmic.exe Token: SeLoadDriverPrivilege 2096 wmic.exe Token: SeSystemProfilePrivilege 2096 wmic.exe Token: SeSystemtimePrivilege 2096 wmic.exe Token: SeProfSingleProcessPrivilege 2096 wmic.exe Token: SeIncBasePriorityPrivilege 2096 wmic.exe Token: SeCreatePagefilePrivilege 2096 wmic.exe Token: SeBackupPrivilege 2096 wmic.exe Token: SeRestorePrivilege 2096 wmic.exe Token: SeShutdownPrivilege 2096 wmic.exe Token: SeDebugPrivilege 2096 wmic.exe Token: SeSystemEnvironmentPrivilege 2096 wmic.exe Token: SeRemoteShutdownPrivilege 2096 wmic.exe Token: SeUndockPrivilege 2096 wmic.exe Token: SeManageVolumePrivilege 2096 wmic.exe Token: 33 2096 wmic.exe Token: 34 2096 wmic.exe Token: 35 2096 wmic.exe Token: SeIncreaseQuotaPrivilege 2096 wmic.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1544 2108 GJecwa34.cpl.exe 30 PID 2108 wrote to memory of 1544 2108 GJecwa34.cpl.exe 30 PID 2108 wrote to memory of 1544 2108 GJecwa34.cpl.exe 30 PID 2108 wrote to memory of 1544 2108 GJecwa34.cpl.exe 30 PID 2108 wrote to memory of 2096 2108 GJecwa34.cpl.exe 34 PID 2108 wrote to memory of 2096 2108 GJecwa34.cpl.exe 34 PID 2108 wrote to memory of 2096 2108 GJecwa34.cpl.exe 34 PID 2108 wrote to memory of 2096 2108 GJecwa34.cpl.exe 34 PID 2108 wrote to memory of 2220 2108 GJecwa34.cpl.exe 35 PID 2108 wrote to memory of 2220 2108 GJecwa34.cpl.exe 35 PID 2108 wrote to memory of 2220 2108 GJecwa34.cpl.exe 35 PID 2108 wrote to memory of 2220 2108 GJecwa34.cpl.exe 35 PID 2220 wrote to memory of 1940 2220 cmd.exe 40 PID 2220 wrote to memory of 1940 2220 cmd.exe 40 PID 2220 wrote to memory of 1940 2220 cmd.exe 40 PID 2220 wrote to memory of 1940 2220 cmd.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\Windows\system32\wbem\wmic.exec:\wzboIP\wzbo\..\..\Windows\wzbo\wzbo\..\..\system32\wzbo\wzbo\..\..\wbem\wzbo\wzboI\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\SuPoiI\SuPo\..\..\Windows\SuPo\SuPo\..\..\system32\SuPo\SuPo\..\..\wbem\SuPo\SuPoi\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1940
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54764c8c335b9603e27754b1c868c0cf4
SHA195a0c23389f39cd2bdfb816f7626438499e44a2f
SHA2569e51103e94a48bffd2e2dced5f857222a0945b1ce183c4f390798134cdddaa58
SHA512ceed31216d65b884e56ad65eb4641013adea76addd7d887944c5227e6615b38e5797ac5cb182b8c58b767771e56c00a89859da9ffebab02032bffc5c77f0dad6