Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/02/2023, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
c7321ee88deeede4d5ad70f74feac847.exe
Resource
win7-20220901-en
6 signatures
150 seconds
General
-
Target
c7321ee88deeede4d5ad70f74feac847.exe
-
Size
276KB
-
MD5
c7321ee88deeede4d5ad70f74feac847
-
SHA1
e847f216a666d69a4784c23672fc36ecbe003dd3
-
SHA256
1ef8dd1b6c059bbf50984bc00eeb54c8b2a05db6dd52b560605292da412bd6f9
-
SHA512
77b92d400f1020e2a30eda2d366ab2568f2ca79f87c6150b0d6c08e14335384db6d2d3bc4941a5308d1c2e8f598781e38357426d4383a1795e3d69553e425a0f
-
SSDEEP
3072:ohiO4hRL+iGL24qWYh5cK5hBLkUyuDLBLy1dV1RhYVO10Ya4ZGb94v9kAJ59kRYC:ohiDRGLJqf7LtDLEkV4Zw94VkATmYW
Malware Config
Extracted
Family
gcleaner
C2
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
pid Process 816 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 764 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 764 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1524 wrote to memory of 816 1524 c7321ee88deeede4d5ad70f74feac847.exe 27 PID 1524 wrote to memory of 816 1524 c7321ee88deeede4d5ad70f74feac847.exe 27 PID 1524 wrote to memory of 816 1524 c7321ee88deeede4d5ad70f74feac847.exe 27 PID 1524 wrote to memory of 816 1524 c7321ee88deeede4d5ad70f74feac847.exe 27 PID 816 wrote to memory of 764 816 cmd.exe 29 PID 816 wrote to memory of 764 816 cmd.exe 29 PID 816 wrote to memory of 764 816 cmd.exe 29 PID 816 wrote to memory of 764 816 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7321ee88deeede4d5ad70f74feac847.exe"C:\Users\Admin\AppData\Local\Temp\c7321ee88deeede4d5ad70f74feac847.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "c7321ee88deeede4d5ad70f74feac847.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\c7321ee88deeede4d5ad70f74feac847.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "c7321ee88deeede4d5ad70f74feac847.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-