Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/12/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
Gosjeufon.cpl.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Gosjeufon.cpl.exe
Resource
win10v2004-20241007-en
General
-
Target
Gosjeufon.cpl.exe
-
Size
881KB
-
MD5
9049faba5517305c44bd5f28398fb6b9
-
SHA1
036c6b32f3e7d7d689c9b4d482091eebcc669bfa
-
SHA256
d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3
-
SHA512
65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a
-
SSDEEP
12288:I2wMm7l55+OeO+OeNhBBhhBBaELPA081o9baXpL3K+HDFgZUid4X9dCU5+Kazw4t:I2wMm7lfCIL3K+gY9dfcw4h3DX9X1
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt Gosjeufon.cpl.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt Gosjeufon.cpl.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Gosjeufon.cpl.exe" Gosjeufon.cpl.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Gosjeufon.cpl.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gosjeufon.cpl.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3492 PING.EXE 2932 cmd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3596 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3492 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3580 Gosjeufon.cpl.exe 3580 Gosjeufon.cpl.exe 3580 Gosjeufon.cpl.exe 3580 Gosjeufon.cpl.exe 3580 Gosjeufon.cpl.exe 3580 Gosjeufon.cpl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3580 Gosjeufon.cpl.exe Token: SeDebugPrivilege 3580 Gosjeufon.cpl.exe Token: SeDebugPrivilege 3580 Gosjeufon.cpl.exe Token: SeIncreaseQuotaPrivilege 660 wmic.exe Token: SeSecurityPrivilege 660 wmic.exe Token: SeTakeOwnershipPrivilege 660 wmic.exe Token: SeLoadDriverPrivilege 660 wmic.exe Token: SeSystemProfilePrivilege 660 wmic.exe Token: SeSystemtimePrivilege 660 wmic.exe Token: SeProfSingleProcessPrivilege 660 wmic.exe Token: SeIncBasePriorityPrivilege 660 wmic.exe Token: SeCreatePagefilePrivilege 660 wmic.exe Token: SeBackupPrivilege 660 wmic.exe Token: SeRestorePrivilege 660 wmic.exe Token: SeShutdownPrivilege 660 wmic.exe Token: SeDebugPrivilege 660 wmic.exe Token: SeSystemEnvironmentPrivilege 660 wmic.exe Token: SeRemoteShutdownPrivilege 660 wmic.exe Token: SeUndockPrivilege 660 wmic.exe Token: SeManageVolumePrivilege 660 wmic.exe Token: 33 660 wmic.exe Token: 34 660 wmic.exe Token: 35 660 wmic.exe Token: 36 660 wmic.exe Token: SeIncreaseQuotaPrivilege 660 wmic.exe Token: SeSecurityPrivilege 660 wmic.exe Token: SeTakeOwnershipPrivilege 660 wmic.exe Token: SeLoadDriverPrivilege 660 wmic.exe Token: SeSystemProfilePrivilege 660 wmic.exe Token: SeSystemtimePrivilege 660 wmic.exe Token: SeProfSingleProcessPrivilege 660 wmic.exe Token: SeIncBasePriorityPrivilege 660 wmic.exe Token: SeCreatePagefilePrivilege 660 wmic.exe Token: SeBackupPrivilege 660 wmic.exe Token: SeRestorePrivilege 660 wmic.exe Token: SeShutdownPrivilege 660 wmic.exe Token: SeDebugPrivilege 660 wmic.exe Token: SeSystemEnvironmentPrivilege 660 wmic.exe Token: SeRemoteShutdownPrivilege 660 wmic.exe Token: SeUndockPrivilege 660 wmic.exe Token: SeManageVolumePrivilege 660 wmic.exe Token: 33 660 wmic.exe Token: 34 660 wmic.exe Token: 35 660 wmic.exe Token: 36 660 wmic.exe Token: SeBackupPrivilege 4552 vssvc.exe Token: SeRestorePrivilege 4552 vssvc.exe Token: SeAuditPrivilege 4552 vssvc.exe Token: SeDebugPrivilege 3580 Gosjeufon.cpl.exe Token: SeDebugPrivilege 3580 Gosjeufon.cpl.exe Token: SeIncreaseQuotaPrivilege 364 wmic.exe Token: SeSecurityPrivilege 364 wmic.exe Token: SeTakeOwnershipPrivilege 364 wmic.exe Token: SeLoadDriverPrivilege 364 wmic.exe Token: SeSystemProfilePrivilege 364 wmic.exe Token: SeSystemtimePrivilege 364 wmic.exe Token: SeProfSingleProcessPrivilege 364 wmic.exe Token: SeIncBasePriorityPrivilege 364 wmic.exe Token: SeCreatePagefilePrivilege 364 wmic.exe Token: SeBackupPrivilege 364 wmic.exe Token: SeRestorePrivilege 364 wmic.exe Token: SeShutdownPrivilege 364 wmic.exe Token: SeDebugPrivilege 364 wmic.exe Token: SeSystemEnvironmentPrivilege 364 wmic.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 952 OpenWith.exe 1508 OpenWith.exe 4320 OpenWith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3580 wrote to memory of 660 3580 Gosjeufon.cpl.exe 83 PID 3580 wrote to memory of 660 3580 Gosjeufon.cpl.exe 83 PID 3580 wrote to memory of 364 3580 Gosjeufon.cpl.exe 101 PID 3580 wrote to memory of 364 3580 Gosjeufon.cpl.exe 101 PID 3580 wrote to memory of 2932 3580 Gosjeufon.cpl.exe 102 PID 3580 wrote to memory of 2932 3580 Gosjeufon.cpl.exe 102 PID 3580 wrote to memory of 2932 3580 Gosjeufon.cpl.exe 102 PID 2932 wrote to memory of 3492 2932 cmd.exe 105 PID 2932 wrote to memory of 3492 2932 cmd.exe 105 PID 2932 wrote to memory of 3492 2932 cmd.exe 105 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
\??\c:\Windows\system32\wbem\wmic.exec:\rtcUYC\rtcU\..\..\Windows\rtcU\rtcU\..\..\system32\rtcU\rtcU\..\..\wbem\rtcU\rtcUY\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\iBeIwH\iBeI\..\..\Windows\iBeI\iBeI\..\..\system32\iBeI\iBeI\..\..\wbem\iBeI\iBeIw\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3492
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Decryptfiles.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3596
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:952
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1508
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4320
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5954e67e4ea50724f251531189b241777
SHA1e5152c4858d2864bcb2f648955abc7667a8eb700
SHA2561e525e366a516bac4261ca642569d1a8c19300f7ba39b8339f5769c66a8bb053
SHA51221cfb403afa77661c829a22603b1c7e09229884ad957cb40a00c45440f4aa29181f0bfe4102b6410768a1a86af0a1d7674854e20f36af1ee36608245f7b306a4