Analysis

  • max time kernel
    122s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 22:57

General

  • Target

    2025-03-28_00800bab3a40f4a859303a5db032f3a1_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    5.3MB

  • MD5

    00800bab3a40f4a859303a5db032f3a1

  • SHA1

    5f73f521539c177c42218b44a7a5dd4eae6655f7

  • SHA256

    8455f66d52f12ee5fcc84fc509b218b9ac091b7817018dfb24117aca006e79e6

  • SHA512

    a05315ee52a2aeb3d87b55b228f02d58f71b18ae378df6925ab0bc3b489fead795e87de722e6b55a547bbc644deaecf63a0d5578d494bb9ffebe32aa03a5b817

  • SSDEEP

    98304:ieF+iIAEl1JPz212IhzL+Bzz3dw/VFuwrJ6itoB6/ztG/k7:pWvSDzaxztQVswr4B64y

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 4 IoCs
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 48 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-28_00800bab3a40f4a859303a5db032f3a1_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-28_00800bab3a40f4a859303a5db032f3a1_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:3132
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2168
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.dll

    Filesize

    5.9MB

    MD5

    cc6ca91fd025d19c9e33038aa51c6681

    SHA1

    46c06f79cc5ac40814813c85f892eff5b18c5696

    SHA256

    07a8cb253da69b43780e94a083374b061ac25109e41a6419d6781392e3c02429

    SHA512

    429826668e992a6ff615f28182e13ffdfd040235f6517c4fbff3a4f0219754197a3390a4b072d7284ff4bb814feebbf3e9b6f8f3909b3684cd33646f011455b7

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    ace8139c53556bac97ef45cf1575727c

    SHA1

    ccc5bee6fd1b2effbab32902474730e4f7fdd439

    SHA256

    b7a4d6d56dec286f6bd8a9338c1403ca7eaf0bd7474feab613352fc89f0b15e5

    SHA512

    4a14bac924095244da5c8056e6f2a24fc918e39a04592bec6a9e46a0d21e9eeb474f161d1f4f7f14d09597819e95f142dcdc324827f5478929dfbe12e0fc6208

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\Q6WWW71J\microsoft.windows[1].xml

    Filesize

    96B

    MD5

    6a6d961090516e141430dd4d8077ce6a

    SHA1

    b98453e45c07a4104fb53af8345803cf9bbe5b78

    SHA256

    71016b2b71e055f2b2421d51d83091a9667df76835f7d014034a6e31143fe8bd

    SHA512

    8c3eade093a2bdbbdaf2bc0d99b713396f5cc776b91ef203a063204891d537685576a68ff8c433afd85a3dd58ba95d3e665a6005f4a1c94dabeb3c466864d5d4

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbres

    Filesize

    2KB

    MD5

    73918f8d52848457a4ca02852dfff42f

    SHA1

    f0008875be97671bb28a3eacf73341190d6a0ab4

    SHA256

    334956e9fcc7b5ff9ce35063d951df7bfa130cb9a473926c03ae3d0915dc6160

    SHA512

    95b953d07600d86c977f1917eb79014586f9c179936a733e439c3af5f986360119ee9fa483e29d0a9bae0100f56ba2fdede07cf5ace850b1eb1bd308bff75620

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133876763709133077.txt

    Filesize

    10KB

    MD5

    3452ec698a9884c22f029220397be6dd

    SHA1

    0ff4a99762952831999b24f564aac3a6743f57bc

    SHA256

    092905ca6e00f3f0a90c182b12edcd34485cf5f1ab050ea9ce87f8c1b69ec02a

    SHA512

    72290444f64eed2aa4fcb79737424b31ef709c489e15beb33b9fcba4c4f790b21a7f6e1cecfedab45d8e198d1e0367953d353a83361667efab167d8660b885ba

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

    Filesize

    9KB

    MD5

    12d8ce3255957a44ee8b4e843160a210

    SHA1

    a23b37c94de490bb7922eafe530ef84192060eaf

    SHA256

    bbab062ffd9b09c7f71d0b31a0a01e2c80ffb617547dc7a8a261a608b2b86b3d

    SHA512

    c9796a149a36f3b6e7b71924387b3e4e580c66bf3b0c580e6a9ffc1a21aa483050af8e7cff64b56b70fb8c87044c9dacd4a502a40a05b2b2689c6d5bd7af3b30

  • C:\WINDOWS\FONTS\ARIALNI.TTF

    Filesize

    4.3MB

    MD5

    8fc656995522d25b795e9409f4221839

    SHA1

    7f85372774c84e436c1aa82b8079f5667126bc0c

    SHA256

    35b68e42710b4b1e9be47b4de09adfaf9525c7db1d01984a01c19c8a9ace48df

    SHA512

    a4a60c212f388637e21167b0561d5b3ec787735d6c6ddad92600a20618352c4e81e8de8e84c4124954bdb2b01bcd8cfa9ec2b5ff7bf098336335cf19fa1bf132

  • C:\WINDOWS\FONTS\MTCORSVA.TTF

    Filesize

    4.3MB

    MD5

    9c0242b00c0aadde32a5958a42699645

    SHA1

    ffc6f3fa32aa7aff648d24727d965a73885c3dff

    SHA256

    8a49868676fd793cebcd71581f5e201cc16ea663c9f11bf295f8f35176da1260

    SHA512

    168aa6e7a9db72cf0c8fcd8ff95d576bb3080ace25a9d280a42a1876303fdff2d7b00c8e47d6bd7b443ac77aa452c1f184b2bec7fceb284db4bd0205c6013555

  • memory/2168-5862-0x000002EFC7C90000-0x000002EFC7CB0000-memory.dmp

    Filesize

    128KB

  • memory/2168-5861-0x000002EFC7730000-0x000002EFC7750000-memory.dmp

    Filesize

    128KB

  • memory/2168-5845-0x000002EFC7770000-0x000002EFC7790000-memory.dmp

    Filesize

    128KB

  • memory/4964-5901-0x0000027B76890000-0x0000027B768B0000-memory.dmp

    Filesize

    128KB

  • memory/4964-5904-0x0000027B76850000-0x0000027B76870000-memory.dmp

    Filesize

    128KB

  • memory/4964-5916-0x0000027B76C60000-0x0000027B76C80000-memory.dmp

    Filesize

    128KB

  • memory/4964-5896-0x0000027B75900000-0x0000027B75A00000-memory.dmp

    Filesize

    1024KB