Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    04-01-2025 01:04

General

  • Target

    The-MALWARE-Repo-master/Email-Worm/Gruel.a.exe

  • Size

    100KB

  • MD5

    b0feccddd78039aed7f1d68dae4d73d3

  • SHA1

    8fcffb3ae7af33b9b83af4c5acbb044f888eeabf

  • SHA256

    5714efd4746f7796bbc52a272f8e354f67edfb50129d5fdaa1396e920956d0d6

  • SHA512

    b02b9476eeb9c43fcfef56949f867c1c88f152d65f3961a2838b8bff02df2383945aefb9a8c517ac78d79b5a9163c7677f5b6238f4624b1966994c9c09eb428d

  • SSDEEP

    1536:ThBfyxwMz14BSSQGRwmkwmGDAzGC6TaPAlbv/g:1BKxwMz14wSQGGUDAATaPAlbv/g

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Gruel.a.exe
    "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Gruel.a.exe"
    1⤵
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl @1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4616
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe shell32.dll,Control_RunDLL netcpl.cpl
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4196
      • C:\Windows\system32\RunDll32.exe
        C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL netcpl.cpl
        3⤵
          PID:4864
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,0
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1108
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL main.cpl @0
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4788
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL modem.cpl
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Gruel.a.exe
          "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Gruel.a.exe" C:\Windows\system32\rundll32.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3168
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL main.cpl @1
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        PID:4704
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl @1
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Gruel.a.exe
          "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Gruel.a.exe" C:\Windows\System32\SystemPropertiesComputerName.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2432
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,1
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:5040
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL timedate.cpl
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1996
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,0
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        PID:1212
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,0
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        PID:2440
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      PID:844
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x408 0x304
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Rundll32.exe

      Filesize

      100KB

      MD5

      b0feccddd78039aed7f1d68dae4d73d3

      SHA1

      8fcffb3ae7af33b9b83af4c5acbb044f888eeabf

      SHA256

      5714efd4746f7796bbc52a272f8e354f67edfb50129d5fdaa1396e920956d0d6

      SHA512

      b02b9476eeb9c43fcfef56949f867c1c88f152d65f3961a2838b8bff02df2383945aefb9a8c517ac78d79b5a9163c7677f5b6238f4624b1966994c9c09eb428d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

      Filesize

      1KB

      MD5

      e9ebee0ddbddbb9bbad21a707a08f2b2

      SHA1

      92b2f08f1ed5ff8ab87ad1bbb05e85e8776e1183

      SHA256

      8fffc79b161ef27a8a0a871f110c358a284425f4f5319836abbf48fe4cbbedba

      SHA512

      3c688c8d443b274f2b19df394116651164e77e78e0e972bb5385308f76197ac2ba073f58d145230fbce5fcc1a0571233f462b35a022976154428d6373155f7bf

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

      Filesize

      1KB

      MD5

      2b067e6304acacbff7da6acd7f2d1b22

      SHA1

      885e5a34e1a522712db0b5beaa041eec1efc4917

      SHA256

      dd34a41516eaab2900e44f8b559ecf768c4ad09275ec534d97871b0e55923010

      SHA512

      4dd4d53dcbc00ac1f6fb9219710619b04f2441c2be276a557fc0cbed2a94f6fc25c3002ece16775ac7be36d3c7b6e4a0f2efe911b3a3bd061283053c8508e32e