Analysis
-
max time kernel
46s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
GJecwa34.cpl.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GJecwa34.cpl.exe
Resource
win10v2004-20240802-en
General
-
Target
GJecwa34.cpl.exe
-
Size
873KB
-
MD5
5b2ac6ed9b0830ec7f1c9eb7deb38c66
-
SHA1
0f1011748dfff6a0d0f0c0b9b8bc045da54080a6
-
SHA256
92ac711db16da541e06c5195050f6fbd8915255c79ded58f70ba030d37135ceb
-
SHA512
d1509fbdf410c943b2df1f05f1ece680dbd45b6090b43985707f6ebccf940cf4d384a235838d75df8f72b688c41fbfc0ef41347dee869de2d7e3dd5aa1da68f8
-
SSDEEP
24576:QLVxajaoPDR60nXKJxrYUrG/fNfhgsqYREh3TR:Q/b3MNJgsqYRed
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt GJecwa34.cpl.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt GJecwa34.cpl.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GJecwa34.cpl.exe" GJecwa34.cpl.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GJecwa34.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini GJecwa34.cpl.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GJecwa34.cpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6036 cmd.exe 4424 PING.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3320 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4424 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1588 GJecwa34.cpl.exe 1588 GJecwa34.cpl.exe 1588 GJecwa34.cpl.exe 1588 GJecwa34.cpl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1588 GJecwa34.cpl.exe Token: SeDebugPrivilege 1588 GJecwa34.cpl.exe Token: SeDebugPrivilege 1588 GJecwa34.cpl.exe Token: SeIncreaseQuotaPrivilege 3988 wmic.exe Token: SeSecurityPrivilege 3988 wmic.exe Token: SeTakeOwnershipPrivilege 3988 wmic.exe Token: SeLoadDriverPrivilege 3988 wmic.exe Token: SeSystemProfilePrivilege 3988 wmic.exe Token: SeSystemtimePrivilege 3988 wmic.exe Token: SeProfSingleProcessPrivilege 3988 wmic.exe Token: SeIncBasePriorityPrivilege 3988 wmic.exe Token: SeCreatePagefilePrivilege 3988 wmic.exe Token: SeBackupPrivilege 3988 wmic.exe Token: SeRestorePrivilege 3988 wmic.exe Token: SeShutdownPrivilege 3988 wmic.exe Token: SeDebugPrivilege 3988 wmic.exe Token: SeSystemEnvironmentPrivilege 3988 wmic.exe Token: SeRemoteShutdownPrivilege 3988 wmic.exe Token: SeUndockPrivilege 3988 wmic.exe Token: SeManageVolumePrivilege 3988 wmic.exe Token: 33 3988 wmic.exe Token: 34 3988 wmic.exe Token: 35 3988 wmic.exe Token: 36 3988 wmic.exe Token: SeIncreaseQuotaPrivilege 3988 wmic.exe Token: SeSecurityPrivilege 3988 wmic.exe Token: SeTakeOwnershipPrivilege 3988 wmic.exe Token: SeLoadDriverPrivilege 3988 wmic.exe Token: SeSystemProfilePrivilege 3988 wmic.exe Token: SeSystemtimePrivilege 3988 wmic.exe Token: SeProfSingleProcessPrivilege 3988 wmic.exe Token: SeIncBasePriorityPrivilege 3988 wmic.exe Token: SeCreatePagefilePrivilege 3988 wmic.exe Token: SeBackupPrivilege 3988 wmic.exe Token: SeRestorePrivilege 3988 wmic.exe Token: SeShutdownPrivilege 3988 wmic.exe Token: SeDebugPrivilege 3988 wmic.exe Token: SeSystemEnvironmentPrivilege 3988 wmic.exe Token: SeRemoteShutdownPrivilege 3988 wmic.exe Token: SeUndockPrivilege 3988 wmic.exe Token: SeManageVolumePrivilege 3988 wmic.exe Token: 33 3988 wmic.exe Token: 34 3988 wmic.exe Token: 35 3988 wmic.exe Token: 36 3988 wmic.exe Token: SeIncreaseQuotaPrivilege 5936 wmic.exe Token: SeSecurityPrivilege 5936 wmic.exe Token: SeTakeOwnershipPrivilege 5936 wmic.exe Token: SeLoadDriverPrivilege 5936 wmic.exe Token: SeSystemProfilePrivilege 5936 wmic.exe Token: SeSystemtimePrivilege 5936 wmic.exe Token: SeProfSingleProcessPrivilege 5936 wmic.exe Token: SeIncBasePriorityPrivilege 5936 wmic.exe Token: SeCreatePagefilePrivilege 5936 wmic.exe Token: SeBackupPrivilege 5936 wmic.exe Token: SeRestorePrivilege 5936 wmic.exe Token: SeShutdownPrivilege 5936 wmic.exe Token: SeDebugPrivilege 5936 wmic.exe Token: SeSystemEnvironmentPrivilege 5936 wmic.exe Token: SeRemoteShutdownPrivilege 5936 wmic.exe Token: SeUndockPrivilege 5936 wmic.exe Token: SeManageVolumePrivilege 5936 wmic.exe Token: 33 5936 wmic.exe Token: 34 5936 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 112 SearchApp.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1588 wrote to memory of 3988 1588 GJecwa34.cpl.exe 84 PID 1588 wrote to memory of 3988 1588 GJecwa34.cpl.exe 84 PID 1588 wrote to memory of 5936 1588 GJecwa34.cpl.exe 87 PID 1588 wrote to memory of 5936 1588 GJecwa34.cpl.exe 87 PID 1588 wrote to memory of 6036 1588 GJecwa34.cpl.exe 88 PID 1588 wrote to memory of 6036 1588 GJecwa34.cpl.exe 88 PID 1588 wrote to memory of 6036 1588 GJecwa34.cpl.exe 88 PID 6036 wrote to memory of 4424 6036 cmd.exe 92 PID 6036 wrote to memory of 4424 6036 cmd.exe 92 PID 6036 wrote to memory of 4424 6036 cmd.exe 92 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\Windows\system32\wbem\wmic.exec:\gzkOpN\gzkO\..\..\Windows\gzkO\gzkO\..\..\system32\gzkO\gzkO\..\..\wbem\gzkO\gzkOp\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\mwjoTh\mwjo\..\..\Windows\mwjo\mwjo\..\..\system32\mwjo\mwjo\..\..\wbem\mwjo\mwjoT\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\GJecwa34.cpl.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:6036 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4424
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1672
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\Decryptfiles.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3320
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:112
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b15a4318fe0408afa709ac8d52f5ac50
SHA1575cc86e039ca89fe86b2e79bcf1e9f749d7cc7d
SHA256e8e7dd648ed61421defbb449e7d5e25f2035691bde7d2ea662d0ef9911fbe469
SHA512e292a4ffd2c7594027ab66e056a170d6d6abd236b11e964e2399de1fa7d35d8a3a2e56f840e167f10531dede89f82e4c7675ac3dda66c70ed4ada7a86374afd7