Analysis
-
max time kernel
53s -
platform
windows11-21h2_x64 -
resource
win11-20250502-en -
resource tags
arch:x64arch:x86image:win11-20250502-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/05/2025, 08:53
Behavioral task
behavioral1
Sample
GoodGirl.exe
Resource
win11-20250502-en
General
-
Target
GoodGirl.exe
-
Size
28.8MB
-
MD5
b51cf93ed17768f7a5462042a7a8262a
-
SHA1
538813357cfc69c0c633c777a6b558d3b30418a2
-
SHA256
48c5c320db86ee2eaa7420a28c27205e2318489f04cec23e67f9c784426bb5e6
-
SHA512
dda7c9a0fdbf7de1c3ef5740e581196dadc40b87f75acd21ded492ca0c068dc32ca6446428a0e651e1bb879fe0e71a7e33336b6868d3741946c5ea21522eb746
-
SSDEEP
786432:Jm6WYkJ/cccerNmc8QxF9NDjOethz/ENbToDKfN:JmFzJ5cerNXlNDjOWE
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe 2112 GoodGirl.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3518521428-3897247806-4080064211-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\_MEI4282\\media/background.png" GoodGirl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3518521428-3897247806-4080064211-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3518521428-3897247806-4080064211-1000_Classes\Local Settings GoodGirl.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1500 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1500 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3652 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3652 AUDIODG.EXE Token: 33 1500 vlc.exe Token: SeIncBasePriorityPrivilege 1500 vlc.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2964 MiniSearchHost.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe 1500 vlc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 428 wrote to memory of 2112 428 GoodGirl.exe 81 PID 428 wrote to memory of 2112 428 GoodGirl.exe 81 PID 2112 wrote to memory of 1500 2112 GoodGirl.exe 85 PID 2112 wrote to memory of 1500 2112 GoodGirl.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\GoodGirl.exe"C:\Users\Admin\AppData\Local\Temp\GoodGirl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\GoodGirl.exe"C:\Users\Admin\AppData\Local\Temp\GoodGirl.exe"2⤵
- Loads dropped DLL
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\_MEI4282\media\video.mp4"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2964
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3652
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD532da96115c9d783a0769312c0482a62d
SHA12ea840a5faa87a2fe8d7e5cb4367f2418077d66b
SHA256052ad6a20d375957e82aa6a3c441ea548d89be0981516ca7eb306e063d5027f4
SHA512616c78b4a24761d4640ae2377b873f7779322ef7bc26f8de7da0d880b227c577ed6f5ed794fc733468477b2fcdb7916def250e5dc63e79257616f99768419087
-
Filesize
48KB
MD5c0c0b4c611561f94798b62eb43097722
SHA1523f515eed3af6d50e57a3eaeb906f4ccc1865fe
SHA2566a99bc0128e0c7d6cbbf615fcc26909565e17d4ca3451b97f8987f9c6acbc6c8
SHA51235db454dbcc7ed89842c0440b92ce0b0b0db41dbd5432a36a0b7e1eddf51704b1f0d6cff5e3a3b0c3ff5db3d8632fed000471180ad72e39d8dbe68a757ccdfb0
-
Filesize
83KB
MD5684d656aada9f7d74f5a5bdcf16d0edb
SHA1f7586da90d101b5ee3fa24f131ee93ab89606919
SHA256449058efc99fccb9e24d640084d845c78f3f86dd34c5c126cf69e523d6320d75
SHA51227fb2eca382675316fb96d18a1aa6b2792077481bf899cbcc658d71f787876045c05c98abf129c9670b6a1d2654d57f59e17580139fa7f482ec27234e44d4235
-
Filesize
130KB
MD529873384e13b0a78ee9857604161514b
SHA1110f60f74b06b3972acd5908937a40e078636479
SHA2565c0d5082fba1a2a3eb8d5e23073be25164c19f21304b09cecaab340dc7198815
SHA512ca826ff5403700e6d8822634e364e43b14ef829095d8fe365b49731236f696fe86ffa3853cd1801dc3b7800d005a032fe23bbc25befe3952ef37790d56dee3c5
-
Filesize
273KB
MD521fcb8e3d4310346a5dc1a216e7e23ca
SHA1aab11aef9075715733e0fcde9668c6a51654b9e1
SHA2564e27c06b84401039d10f800a0f06446b58508784ee366c7c8324d8fe9794e1a5
SHA512c064550d1723e92512a42ce367ecef9331a81121305d66199abce6e0977152d927f7223f475e22c67e3f64b0f612c5553f112d8ce653c666a98d1980d200a599
-
Filesize
63KB
MD53e540ef568215561590df215801b0f59
SHA13b6db31a97115c10c33266cce8ff80463763c7e6
SHA25652f29aebe9886e830dedc363cd64eb53b6830d84b26e14f1b6faa655a0900b5d
SHA51221497a4d1d999a420ed0e146544f4149c72ad4aca4b869a0ee83267d92afa07609ece76a4e95ec706a21580d6544146d0a58c0baa01aa2c242474a4816108527
-
Filesize
155KB
MD5d63e2e743ea103626d33b3c1d882f419
SHA1af8a162b43f99b943d1c87c9a9e8088816263373
SHA25648f16b587c6faa44a9e073365b19599200b0f0a0ccb70121e76c2dac4ed53281
SHA512d3f1450b5def3c21f47c5133073e76d2ec05787eb6ae88bb70d3a34be84f6025540ac017e9415bb22ef36c2ffbfcea38a28842eefe366325f3d3cf2cca1a3cb1
-
Filesize
34KB
MD5cc0f4a77ccfe39efc8019fa8b74c06d0
SHA177a713cd5880d5254dd0d1cbfe0d6a45dfc869ce
SHA256af8ac8ab8b39f53b5dc192fbf58ad704a709db34e69753b97b83d087202e3a36
SHA512ffea0bd7f73b6c02df6ff37ef39b8e54e480a4cc734fb149adc5c7410f445effd1fdd4f24e4619f7158913a50c28cc73629524d1a7389101a75257d5652c7823
-
Filesize
83KB
MD5566cb4d39b700c19dbd7175bd4f2b649
SHA1bede896259b6d52d538c2182aef87c334fc9c73c
SHA256bced17d6f081d81ea7cd92f1e071e38f8840e61ee0fe1524221b776bcfa78650
SHA5126a26fd59e2c2ec34b673ef257a00d5577f52286d78525d05efc8a88760fb575be65c3e94e83396f4978c8734b513afe7f09d3c49474169144f98add406530367
-
Filesize
38KB
MD547e6fd132f44a4feb595bd0fda3c4e1c
SHA137c6c2c1ff309db7273afc9324a37b716c5cbfdb
SHA256ebd252d21af9c84128fca04c994093a5bd6ee857f1581f06f4026fdd6a2c40e0
SHA51269c031d4ff2dac70739f9c188fca3c6969304f22782adf5a9c0ca303a3a712630541bda888ef25d3252b46d43df56f6e7e03c83d331840088c4224d1a1a512c4
-
Filesize
1.3MB
MD538c2b8dcdfd4b77c796b5c54a3edd5ed
SHA1a47f74f28d76dfc2b7637f0165bbc8c24b0faa58
SHA25639bfb783785f65c88d9b1c6f6d73565e85cdec615933982e9ed6a4cd503d326b
SHA5126c191747e3f9e17ab41b0f5bba019b9da2da7e851aa3ed1116032fe1b081a954d5a470af006f614eaa41ec9e623d35ccb2c4ca3d7dca68021f7045f69d4858f9
-
Filesize
5.0MB
MD5ae5b2e9a3410839b31938f24b6fc5cd8
SHA19f9a14efc15c904f408a0d364d55a144427e4949
SHA256ccfffddcd3defb8d899026298af9af43bc186130f8483d77e97c93233d5f27d7
SHA51236ea760a7b56ea74174882155eddfb8726828240fcfc6b34d90ecdb7e50a7e632374dcbc9b2889081c0973cc51f50967e7d692498c4abd1f2cba3f7fe8d659cc
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
21.8MB
MD587a5398ded8c9255853f84a4903db9ec
SHA17ade6695dadb41ccf8fc3154e316cbb22443d34f
SHA25666d6ee1711ffabc6eefe3f48877d8876cc6afbc6f55bfbc77456979578fb254d
SHA51241d57ef43ade3b6e2807df9d5f8ed52ccadf8db3d7ae0c166b03a233838c7a2d5d6cbafff944fbb9709f694c37ba87806603460b2d0933303796463d1760524f
-
Filesize
5.8MB
MD57387fe038ea75eb9a57b054fccfe37bf
SHA15c532cbdfd718b5e80afb2ee8dea991e84757712
SHA25669fd86ea29370697c203f7e12830084f920f490766a8e3045af52c036a9ad529
SHA512c46c982b04079ed0b13617b81168598632d6c58d29e23fcbfa064b08e5836866b74880e1a9c01c12670531f13521a21177aafb10be0abb329a79291d7bff08bd
-
Filesize
31KB
MD5715a098175d3ca1c1da2dc5756b31860
SHA16b3ec06d679c48bfe4391535a822b58a02d79026
SHA2566393121130a3e85d0f6562948024d8614c4c144b84ab102af711c638344d1599
SHA512e92edb98427f594badec592493469d45deab3b71e4598d544d0b9a1acffd5327a19c09029fb79d70971cb0ed0dba56056bef8455534d3f16ec35eac723062f3c
-
Filesize
695KB
MD5503b3ffa6a5bf45ab34d6d74352f206b
SHA1cc13b85281e5d52413784e0b65a61b1d037c60cc
SHA256071494856fdad0042964769aa2fb1de4ea95c2cfcbe27cc7132293c68d13d710
SHA512d20b860974161caa60a62268968af353ad8063589f57d71f57c91855eb83da78f40bae7aa745cc7a945d92ebe08cf244c9560ae93449de45b20a8b8fff9f5010