Malware Analysis Report

2024-11-30 02:26

Sample ID 241022-yvkhra1gpc
Target Gatherum Installer.exe
SHA256 17ef63395dd24979aeaf6bae39cc015ab6f2c4f1a636b2f7d376428a0d072ef8
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

17ef63395dd24979aeaf6bae39cc015ab6f2c4f1a636b2f7d376428a0d072ef8

Threat Level: Shows suspicious behavior

The file Gatherum Installer.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Executes dropped EXE

Loads dropped DLL

System Location Discovery: System Language Discovery

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-22 20:06

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-22 20:06

Reported

2024-10-22 20:21

Platform

win10v2004-20241007-en

Max time kernel

550s

Max time network

433s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Gatherum Installer.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7z7B56833C\GatherumApp.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Gatherum Installer.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7z7B56833C\GatherumApp.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Gatherum Installer.exe

"C:\Users\Admin\AppData\Local\Temp\Gatherum Installer.exe"

C:\Users\Admin\AppData\Local\Temp\7z7B56833C\GatherumApp.exe

C:\Users\Admin\AppData\Local\Temp\7z7B56833C\GatherumApp.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 93.252.19.2.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 2.36.159.162.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 98.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 41.173.79.40.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\7z7B56833C\PresentationNative_cor3.dll

MD5 274761a595f86982214221b5685b3218
SHA1 b908013028cb07fb799de2e48b6492404add6069
SHA256 6d5910c0a0a4e3ee8863e4dadc73662d28ae9bfcda4a52960e26c1237386851a
SHA512 3f9cf3d8e428619b798374f2e2a6ef9cf4213428277a74306978552772aae1a4a9ae7247c2dc893c0054d480dda871bbd74b0bc4afd65b0f584958d501ed8867

C:\Users\Admin\AppData\Local\Temp\7z7B56833C\wpfgfx_cor3.dll

MD5 627ecf139beed59b4e1b26caac8f68e4
SHA1 9747fe073aed451c936a66f8ad112bbb1a8c31c8
SHA256 0a01412b64e6889ace8933dd2f559d186b693aefe31e6b084e2d435b1737af39
SHA512 25bdb740039c867ce0cc1347493cf456e32d767c898a683da1306992ae77ed3605612c804c2eae483320f18f2cd0850c17226ef21e09fe07997aa47679b6030e

C:\Users\Admin\AppData\Local\Temp\7z7B56833C\D3DCompiler_47_cor3.dll

MD5 03a60a6652caf4f49ea5912ce4e1b33c
SHA1 a0d949d4af7b1048dc55e39d1d1260a1e0660c4f
SHA256 b23e7b820ed5c6ea7dcd77817e2cd79f1cec9561d457172287ee634a8bd658c3
SHA512 6711d40d171ea200c92d062226a69f33eb41e9232d74291ef6f0202de73cf4dc54fbdd769104d2bb3e89dc2d81f2f2f3479e4258a5d6a54c545e56b07746b4c4