Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 01:48

General

  • Target

    2025-04-04_bbcc82fb7375c8531b68398378b00cb5_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe

  • Size

    4.1MB

  • MD5

    bbcc82fb7375c8531b68398378b00cb5

  • SHA1

    e2afc960fbb81168d13ddf15732fdd685db71847

  • SHA256

    b4c1cd4873af0800223bdbf9078f4c24b0fa8e73cf610aa8a2714bac585edcee

  • SHA512

    15c6cdc722e8885bbf6fb0d351b5eb8e4e4a0a74fba4082c9294efdcfdf19bed7c808e97841e80aeadf1c311429ee2f3102a511bec8741a6bb0115cc060535bf

  • SSDEEP

    49152:ieutLO9rb/TrvO90dL3BmAFd4A64nsfJJ2TIA5GNP1Jr4u/TgAPNdi9128qk1q4q:ieF+iIAEl1JPz212IhzL+Bzz3dw/VA

Malware Config

Signatures

  • Gofing

    Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation.

  • Gofing family
  • Gofing is a ransomware written in Golang using Velocity Polymorphic Compression (VPC) obfuscation. 8 IoCs
  • Renames multiple (51) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 22 IoCs
  • Manipulates Digital Signatures 3 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 54 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-04_bbcc82fb7375c8531b68398378b00cb5_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-04_bbcc82fb7375c8531b68398378b00cb5_cobalt-strike_frostygoop_ghostlocker_luca-stealer_sliver_snatch.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops startup file
    • Drops Chrome extension
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:3704
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4552
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.dll

    Filesize

    5.9MB

    MD5

    09b221a24eb847bd9baeb48863acd728

    SHA1

    64f65e4932208e1f3ee69af9d9e9392b820b3322

    SHA256

    84073fc8df844578cfabee985389ca06c43059692f441b498d297cfcbdbe6b66

    SHA512

    86294911a4e7bc05a29b78462c3e61797db40d02c2eac1d64fe6fb46cd71a8af1d52645287e404106eb3db84806f85a935d328615cbfb4d7574bac549a6b611c

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

    Filesize

    5.8MB

    MD5

    ed105a3b25a4f3f39cdc3bd55c0070a8

    SHA1

    a4c7926f41c92fa60621e0e4428748a6d1de36b7

    SHA256

    3e49bbaf2bab65f51405b8d6257b7ceaddac038559d7d9f0e51de01616753d04

    SHA512

    7a6a56289bda31d67a36e642358eeb6be11b4ade1d0c83b2c0e587347f19abbc125d2ea18544f4afd69db941b97a6ad21b6cd2e445b1015d063ac1307b2de916

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DE8CY514\microsoft.windows[1].xml

    Filesize

    97B

    MD5

    fc956db2851ef12da68d2c9ff8aa5f1d

    SHA1

    5978b893499ab9db347cec91dbed08b5fb3b37d0

    SHA256

    6a8571f980a5f1c6a9dfe314f4fe5db0d21abffd720246d31e7ba256bee6ea86

    SHA512

    5e4c74cdf403857698486cd635fe20c73c7f783596e7afe2344e17ef40f14f8fb7ca66b85f747f0c8cc7cf6a7648b4a04a3b7cdc60122a4da11da4502058c8ec

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbres

    Filesize

    2KB

    MD5

    b84bcf1623f87a3a13faa40a5125c14b

    SHA1

    6b9e33494dde55d1e3c6d61c3022a63f46c2d7ca

    SHA256

    616fe3672a6e8c45ef8f8bc487cd0538ff6605f3d0cf2de07502b3e534ec5a26

    SHA512

    7e4c965ae2ec4c8f067fa0e2e95ece436be607e66acf00c54e0de6ca6c8ceec230b9427aa0397de4e868821b899986c57287c8112e5402f6fa130e9b68c5ab8b

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133882049918643506.txt

    Filesize

    26KB

    MD5

    d2655ca9678bfda8467f7fa4905b4d24

    SHA1

    e0ccecd2719c42ed967d9fc2b4ed2ab30bafd378

    SHA256

    e2e1aea3ce75e5e1597c8928123bbf4679c86a71ed0a5edee110ddb9f29eff20

    SHA512

    36b6fbaaa1b6725261caf6694aed5c44a633de2fd09dee76a633a40f7830dd6231c316b5c93f7d93f34cca48713e3a416ec8cb4333e155c05e1489d8086803ef

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133882049959088113.txt

    Filesize

    14KB

    MD5

    b9a3570135c6cdac61e23a655424bb81

    SHA1

    b25c823b867b820fa34e0d61892c99af1b3db241

    SHA256

    e193af6a87eea12acbb0e56ca2c4e0b078e4c775d8b0f46c327eeb0ce00ce2e6

    SHA512

    73f70af649bf07c3c9c9298c78f8fc1168be976af14b7e381ccf33fef36cfc4809becb8d2c7ecb5ea8d198f7bdf1c2f30ed1c800df4086099215c8ade7d86ca0

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

    Filesize

    12KB

    MD5

    1e3bcae962f769dc414086518f6cd813

    SHA1

    7ecd07c3fda50cecce9cfc719d5ef2a10604ccfb

    SHA256

    26fff0760d9971df18b776e4a621aaca560f35f569625af3b51fb4b82733e15b

    SHA512

    05b1d0e50360b0523f02579c78613aa76b09858b09d1dbef2ac8dfe64ae9051c66b11a950f906a3d3d541786e543edaeb7457de556c5f9693bba011fd63f057a

  • C:\WINDOWS\FONTS\ANTQUAB.TTF

    Filesize

    4.3MB

    MD5

    edc9800790c2875b165e67ac43ffc054

    SHA1

    dbb66fdf23aa544ca859b5e5a9fde6f2e2fe865c

    SHA256

    5006995e01647492ec7b926d102916a0d6457a9ba361b7b22bdeff28068ce303

    SHA512

    cf535ca73a8af601fdbceb0e5cff371515fafbae3baa57fd37e260cc653c616ed46add3e088af22f5b37975cda91710472b23ffdc7b5fd7af00e7ac270a16df6

  • C:\WINDOWS\FONTS\ANTQUABI.TTF

    Filesize

    4.3MB

    MD5

    6605fbabf0f16035ad1a33f084e114f5

    SHA1

    1f54a643ebfa0fa9931f2782222e3cbd3d029635

    SHA256

    4f24489911ad3256955f431a74b0189a8ce6c93df8a1cb49125121ddfa69af39

    SHA512

    a727d55a984be66ec5a0f1657a98f0d84722eefd2241b184b17c308d64e0e0af23a3bcffdbc7eb9c2d8dfef6bb8eb3eef9b2875ecc3381ebd17145dbdad4b87f

  • C:\WINDOWS\FONTS\ANTQUAI.TTF

    Filesize

    4.2MB

    MD5

    81b88a4c64e70d2a796b59e46417a556

    SHA1

    09808869cb8cb2bc0d919c4c6053f9affef73ae2

    SHA256

    35c104feecbd4bfa37ab036824d9f88018e641e0dde3cde387c9948cfeb79bef

    SHA512

    9d937811cccc096215635dc9e1943b143aacaaf135f987f72fa0e80055fbaaf310dc9801584f1551b8e3380391afb4c5319cbf0229bd304afbe045ecfeee54ad

  • C:\WINDOWS\FONTS\ARIALN.TTF

    Filesize

    4.3MB

    MD5

    793e75e1dc7190b13998b484dd16abf7

    SHA1

    0e93cf1aff409dcc540797ac805c90e9ae723a98

    SHA256

    917791181d4058bfcf573172d917bcb9f1752f2185de97164332d5e0298978dd

    SHA512

    8913e405feb118b44f4a2fd8830056b6f3ba79397881326e6a81de19ed23bb0536f4743db306246cc4762c36218c6c0135edf69afa6a4ce5d92170d39349946d

  • C:\WINDOWS\FONTS\ARIALNB.TTF

    Filesize

    4.3MB

    MD5

    b179dcf5b8e85a44c35d2d120d1ff44d

    SHA1

    d7b60917d0c124c64d007bcae5c818b86d07fcac

    SHA256

    1742f2ffd2571faef4d5ca4cef3e2703a1fc19c949a3d9d540754bbc54207f31

    SHA512

    e115e8c2b6f3510b34f2532d1259b508d8bb5359f4a17a32454715d9de9cbecff24c84b9a9b79340566b6214b4ee475ef219c5e261c5f6092ab257ab73a86e81

  • C:\WINDOWS\FONTS\DUBAI-REGULAR.TTF

    Filesize

    4.3MB

    MD5

    b96f6435f92ec6863f299aef7f9bfe29

    SHA1

    92fa7ef320f28bca222e57ddfe243e95f62f2177

    SHA256

    e68b1a1b71767fe58441a003544017b7508750fc5956ec76362d16d280b0ecfb

    SHA512

    41fb19dd786d7b9408c21ace617646ef1cb1e8473fe01c617a30ff5294c9a0352bcc4f21ffc9dcb087b7d7299bac9278415a7381860279e8cf0c75de724ef812

  • memory/4552-5785-0x0000019247DD0000-0x0000019247DF0000-memory.dmp

    Filesize

    128KB

  • memory/4552-5786-0x0000019247860000-0x0000019247880000-memory.dmp

    Filesize

    128KB

  • memory/4552-5772-0x0000019246D00000-0x0000019246E00000-memory.dmp

    Filesize

    1024KB

  • memory/4552-5777-0x0000019A49020000-0x0000019A49040000-memory.dmp

    Filesize

    128KB

  • memory/4552-5770-0x0000019246D00000-0x0000019246E00000-memory.dmp

    Filesize

    1024KB

  • memory/5444-5833-0x000001F70FD00000-0x000001F70FE00000-memory.dmp

    Filesize

    1024KB

  • memory/5444-5837-0x000001F711780000-0x000001F7117A0000-memory.dmp

    Filesize

    128KB

  • memory/5444-5861-0x000001F711B50000-0x000001F711B70000-memory.dmp

    Filesize

    128KB

  • memory/5444-5855-0x000001F711740000-0x000001F711760000-memory.dmp

    Filesize

    128KB

  • memory/5444-5832-0x000001F70FD00000-0x000001F70FE00000-memory.dmp

    Filesize

    1024KB