Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2025 19:43

General

  • Target

    data-Setup/data/gkcc.dll

  • Size

    38.9MB

  • MD5

    0303e644cbb68b806e1c5789e695038a

  • SHA1

    bb18ccffb3896e10202dcdead5b7046d343124b7

  • SHA256

    eace3c55a3f9b9e70f93ec8bf8398e21d3e0ab11bc387e6a893f1575ec61ec2b

  • SHA512

    a6c8f76dcb24cd02815bb65d43f710a8552dc9a5f01ffb55fbfb75fdd48e096aa960bc475e82a74662d55ae12fb4e8c31a01d401e03dba82d7da8ae319daab41

  • SSDEEP

    786432:o7u7kk+g2L3NohqHBImTQOavD9KdnLL7rqrukJmzzdTw:7f+gIyYnQBD9KdLL7rq6osJc

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\data-Setup\data\gkcc.dll,#1
    1⤵
      PID:1112
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU1NzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODAxNjUyMzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mzc0Mzk0NjEzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4596
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\MicrosoftEdge_X64_132.0.2957.140.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
        2⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Installs/modifies Browser Helper Object
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1584
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6a0a8a818,0x7ff6a0a8a824,0x7ff6a0a8a830
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:2936
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:3784
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6a0a8a818,0x7ff6a0a8a824,0x7ff6a0a8a830
            4⤵
              PID:1320
          • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
            3⤵
              PID:5060
            • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
              3⤵
                PID:4960
              • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
                3⤵
                  PID:3696

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1417B0CA-F83E-4795-A2DA-F69FC635A00F}\EDGEMITMP_96E6D.tmp\setup.exe

              Filesize

              6.6MB

              MD5

              b4c8ad75087b8634d4f04dc6f92da9aa

              SHA1

              7efaa2472521c79d58c4ef18a258cc573704fb5d

              SHA256

              522a25568bb503cf8b44807661f31f0921dee91d37691bf399868733205690bf

              SHA512

              5094505b33a848badcffd6b3b93aad9ad73f391e201dee052376c4f8573ba351f0b8c102131216088ffb38d0ed7b5fe70ba95c3ac2c33a50c993584fe7c435e3

            • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe

              Filesize

              5.3MB

              MD5

              d9696627c2f747668fec9d8f7e93c639

              SHA1

              8936c1a96b915f1b86deafe43b52dd8989eb9a01

              SHA256

              29427b2aef59aab78c2540e07f8086330ebd5a372ba5254bfb8ac7cee095f5f2

              SHA512

              51329668fd31cd7834b298a86870ca3d2f570086b5ab6a1c190d6938acaaf752b6f715ad9dffc4d28b384b529e3df2eb2ed9d5b97cbca4d76f28758d10457be7

            • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe

              Filesize

              4.8MB

              MD5

              80f0125e7a36ba9128341694baf7ecea

              SHA1

              ebeccc9fad3eef4adb7b3973816ec6ce1b117026

              SHA256

              6125d1f778e9644574e0f61c0f1e09118b5deb9a2dec9c989fe2fc0bd5c6caa2

              SHA512

              fecd60361b85b34fecb7c3362bb8c5108cf6e47d6fbd0ae83521420e5051701586295a4535d8a98b9855e505fb72bb83d4517087262e13d72a8a313928e3e818

            • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe

              Filesize

              4.6MB

              MD5

              aaf7e492025bedd4466dab9aea0636d3

              SHA1

              19b609a04797765fb4107d2ba7a3b2e95f7bbc94

              SHA256

              223d6cc006f0e597d5db687208ec0a8caaf8422f667a7b39cf67fc8cb5948644

              SHA512

              87a2574f6d8ebaa594726ea6f92cabf2b54c2b4200be479e836b8fd630af0e13f3f3d7c39be869fcf593233f5a413827674baf368fdd76362c2e2ba0c7b06501

            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

              Filesize

              3.7MB

              MD5

              3646786aea064c0845f5bb1b8e976985

              SHA1

              a31ba2d2192898d4c0a01511395bdf87b0e53873

              SHA256

              a129a6de7b90500483226192b260eaca1ee116a007771d421aa3eee38af48d6f

              SHA512

              145f8abf2ecffd8ecc3745dbd9ab2e360826fa46d6f21dbebece7802b9b5980f4ab19e2dfd180ce0cfb84366f3ac5c87cd1b74a085e1a0dd620b6c097900e0f4

            • C:\Program Files\msedge_installer.log

              Filesize

              72KB

              MD5

              f4bda29b4d2489b549c3dc98979f25de

              SHA1

              0b9020f615c8893c270852a14779572c29c7b637

              SHA256

              6254c25d3e76b2e4c7431f15fc53480e7f97fa28efb82797a1bd593b1dbba676

              SHA512

              31002bc4ea818aeee7db41db6eab0a69b363d87692b88d873af998c537a60a2f77c4ef6f0a53459eec2c43ab87d2b17f900d1f1c2ba8d5023f5e65197de9a108