Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
G-77904DOC.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
G-77904DOC.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
gavvjlio.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
gavvjlio.exe
Resource
win10v2004-20241007-en
General
-
Target
G-77904DOC.exe
-
Size
300KB
-
MD5
e133504aa7c92bcc8b358abfa4c36a20
-
SHA1
68a3dc52c35115003d74c224dfc3f9e95bd00c04
-
SHA256
58a064152959df9f0b10cb78b8cdcda6eae112619a7239ddc0c18547e7e3a598
-
SHA512
98b75db2b869e910565321e829689366be7f319cf6f3aaaac65d06a36b6985cbdec0e16261bfeb0f93b8a48d5b1c707ef28deb84430ccb738dff0699a3a5fd60
-
SSDEEP
6144:rGiwlK7jQRnqGFYtTJJr3+WZmHXH0CNK0d2Rr+oGJyRt1sy2:QcQxYtTbr1Z4/XZMwy2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4944 gavvjlio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3508 4944 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G-77904DOC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gavvjlio.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1384 wrote to memory of 4944 1384 G-77904DOC.exe 83 PID 1384 wrote to memory of 4944 1384 G-77904DOC.exe 83 PID 1384 wrote to memory of 4944 1384 G-77904DOC.exe 83 PID 4944 wrote to memory of 3420 4944 gavvjlio.exe 84 PID 4944 wrote to memory of 3420 4944 gavvjlio.exe 84 PID 4944 wrote to memory of 3420 4944 gavvjlio.exe 84 PID 4944 wrote to memory of 3420 4944 gavvjlio.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe"C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\gavvjlio.exeC:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\gavvjlio.exeC:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky3⤵PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 5923⤵
- Program crash
PID:3508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4944 -ip 49441⤵PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD54f1abaead61fe7411fc7c6ee5082d665
SHA1b4ad83dea14c06e0aa2c2ca582b52a527ec01d77
SHA256e6b54e61fb080c3f6efb98d3ac8d182ad859fee863cc43478c99d3660bec6bd5
SHA512e045f7094df1552776c1542edef3066663fcbfcf7dcd9bc871de273ce087c898aee583f603f34532d94e8ee22f86b550c736ab9232f72c2966cd62613dc5baab
-
Filesize
213KB
MD5a9a514cd5d9c755b8319c055b0d6d06e
SHA15717539cbc2ab9a7c01443182abfa50bb0520694
SHA256b53b25f3d0418c286e8d4c78fc4080ecd05f00bd6b39fa16241335bfc05670df
SHA51282f9978685f9877e20b24dd60bb32b05c3c23b54275c107cb7017a15f5802d1540ef10709ae90de0b0cef83e32c57c66063aa1db8f8ef7a6708a40d352d7ecf5
-
Filesize
4KB
MD5cd2d9713ae5995ee2bf3af08d8eecc52
SHA1c08cf6596eb17e3f52295cef79c51b67c86bf407
SHA256ad332e48b605d4d44a205c3bc93414696b372e08efdb9d423b69452a04db9e67
SHA512e3a5ce9c56ac429f6ab33c79b57580155173bdb9e2f010d952d32ee95e08db893004b6bf37e4665f112b3b2bb01210e71fb125a9772addbc9a9c985224ed3fb5