Analysis
-
max time kernel
25s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
Gosjeufon.cpl.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Gosjeufon.cpl.exe
Resource
win10v2004-20241007-en
General
-
Target
Gosjeufon.cpl.exe
-
Size
881KB
-
MD5
9049faba5517305c44bd5f28398fb6b9
-
SHA1
036c6b32f3e7d7d689c9b4d482091eebcc669bfa
-
SHA256
d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3
-
SHA512
65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a
-
SSDEEP
12288:I2wMm7l55+OeO+OeNhBBhhBBaELPA081o9baXpL3K+HDFgZUid4X9dCU5+Kazw4t:I2wMm7lfCIL3K+gY9dfcw4h3DX9X1
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt Gosjeufon.cpl.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt Gosjeufon.cpl.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Gosjeufon.cpl.exe" Gosjeufon.cpl.exe -
Drops desktop.ini file(s) 10 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Gosjeufon.cpl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Gosjeufon.cpl.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gosjeufon.cpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2732 PING.EXE 1368 cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1740 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2732 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2980 Gosjeufon.cpl.exe 2980 Gosjeufon.cpl.exe 2980 Gosjeufon.cpl.exe 2980 Gosjeufon.cpl.exe 2980 Gosjeufon.cpl.exe 2980 Gosjeufon.cpl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2228 wmic.exe Token: SeSecurityPrivilege 2228 wmic.exe Token: SeTakeOwnershipPrivilege 2228 wmic.exe Token: SeLoadDriverPrivilege 2228 wmic.exe Token: SeSystemProfilePrivilege 2228 wmic.exe Token: SeSystemtimePrivilege 2228 wmic.exe Token: SeProfSingleProcessPrivilege 2228 wmic.exe Token: SeIncBasePriorityPrivilege 2228 wmic.exe Token: SeCreatePagefilePrivilege 2228 wmic.exe Token: SeBackupPrivilege 2228 wmic.exe Token: SeRestorePrivilege 2228 wmic.exe Token: SeShutdownPrivilege 2228 wmic.exe Token: SeDebugPrivilege 2228 wmic.exe Token: SeSystemEnvironmentPrivilege 2228 wmic.exe Token: SeRemoteShutdownPrivilege 2228 wmic.exe Token: SeUndockPrivilege 2228 wmic.exe Token: SeManageVolumePrivilege 2228 wmic.exe Token: 33 2228 wmic.exe Token: 34 2228 wmic.exe Token: 35 2228 wmic.exe Token: SeIncreaseQuotaPrivilege 2228 wmic.exe Token: SeSecurityPrivilege 2228 wmic.exe Token: SeTakeOwnershipPrivilege 2228 wmic.exe Token: SeLoadDriverPrivilege 2228 wmic.exe Token: SeSystemProfilePrivilege 2228 wmic.exe Token: SeSystemtimePrivilege 2228 wmic.exe Token: SeProfSingleProcessPrivilege 2228 wmic.exe Token: SeIncBasePriorityPrivilege 2228 wmic.exe Token: SeCreatePagefilePrivilege 2228 wmic.exe Token: SeBackupPrivilege 2228 wmic.exe Token: SeRestorePrivilege 2228 wmic.exe Token: SeShutdownPrivilege 2228 wmic.exe Token: SeDebugPrivilege 2228 wmic.exe Token: SeSystemEnvironmentPrivilege 2228 wmic.exe Token: SeRemoteShutdownPrivilege 2228 wmic.exe Token: SeUndockPrivilege 2228 wmic.exe Token: SeManageVolumePrivilege 2228 wmic.exe Token: 33 2228 wmic.exe Token: 34 2228 wmic.exe Token: 35 2228 wmic.exe Token: SeBackupPrivilege 2896 vssvc.exe Token: SeRestorePrivilege 2896 vssvc.exe Token: SeAuditPrivilege 2896 vssvc.exe Token: SeIncreaseQuotaPrivilege 1544 wmic.exe Token: SeSecurityPrivilege 1544 wmic.exe Token: SeTakeOwnershipPrivilege 1544 wmic.exe Token: SeLoadDriverPrivilege 1544 wmic.exe Token: SeSystemProfilePrivilege 1544 wmic.exe Token: SeSystemtimePrivilege 1544 wmic.exe Token: SeProfSingleProcessPrivilege 1544 wmic.exe Token: SeIncBasePriorityPrivilege 1544 wmic.exe Token: SeCreatePagefilePrivilege 1544 wmic.exe Token: SeBackupPrivilege 1544 wmic.exe Token: SeRestorePrivilege 1544 wmic.exe Token: SeShutdownPrivilege 1544 wmic.exe Token: SeDebugPrivilege 1544 wmic.exe Token: SeSystemEnvironmentPrivilege 1544 wmic.exe Token: SeRemoteShutdownPrivilege 1544 wmic.exe Token: SeUndockPrivilege 1544 wmic.exe Token: SeManageVolumePrivilege 1544 wmic.exe Token: 33 1544 wmic.exe Token: 34 1544 wmic.exe Token: 35 1544 wmic.exe Token: SeIncreaseQuotaPrivilege 1544 wmic.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2228 2980 Gosjeufon.cpl.exe 31 PID 2980 wrote to memory of 2228 2980 Gosjeufon.cpl.exe 31 PID 2980 wrote to memory of 2228 2980 Gosjeufon.cpl.exe 31 PID 2980 wrote to memory of 2228 2980 Gosjeufon.cpl.exe 31 PID 2980 wrote to memory of 1544 2980 Gosjeufon.cpl.exe 37 PID 2980 wrote to memory of 1544 2980 Gosjeufon.cpl.exe 37 PID 2980 wrote to memory of 1544 2980 Gosjeufon.cpl.exe 37 PID 2980 wrote to memory of 1544 2980 Gosjeufon.cpl.exe 37 PID 2980 wrote to memory of 1368 2980 Gosjeufon.cpl.exe 39 PID 2980 wrote to memory of 1368 2980 Gosjeufon.cpl.exe 39 PID 2980 wrote to memory of 1368 2980 Gosjeufon.cpl.exe 39 PID 2980 wrote to memory of 1368 2980 Gosjeufon.cpl.exe 39 PID 1368 wrote to memory of 2732 1368 cmd.exe 41 PID 1368 wrote to memory of 2732 1368 cmd.exe 41 PID 1368 wrote to memory of 2732 1368 cmd.exe 41 PID 1368 wrote to memory of 2732 1368 cmd.exe 41 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\Windows\system32\wbem\wmic.exec:\gvLepO\gvLe\..\..\Windows\gvLe\gvLe\..\..\system32\gvLe\gvLe\..\..\wbem\gvLe\gvLep\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\rsqmgv\rsqm\..\..\Windows\rsqm\rsqm\..\..\system32\rsqm\rsqm\..\..\wbem\rsqm\rsqmg\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Gosjeufon.cpl.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2732
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2420
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Decryptfiles.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1740
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5173f657c13a3442ce3462ae8a7f7d9aa
SHA1f69407cd29caac9b55484431af5c0d41750a7390
SHA25631e0385d169674cdbe17a60de09c29fa837ee7f6cf5e5d601d304cc8c5b3a414
SHA512ea8b4d12f7dcd0a2859906630a90f780573e988a680320983f27fc587bfe8f4934205fa09448b0c8bc2d96456e5b7e1fed3260e73ec6924db3a472f3c68e06cf