Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-03-2023 11:26
Static task
static1
Behavioral task
behavioral1
Sample
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe
Resource
win7-20230220-en
General
-
Target
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe
-
Size
332KB
-
MD5
be8060c6a8398acadab32498f98f5556
-
SHA1
e759f4222f13d900ba19a2c7fc911a9dcd8a0909
-
SHA256
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522
-
SHA512
3f649fb726039bb4ff4ed3186de7141c1b3ad0911f6ea7fefef0fef3f08abefafa70faa870a6b9eafbd5f3ab58dfb45be165ed52f87ede1155fefbab4ae4d6ad
-
SSDEEP
6144:QVXnCBimgu6LoCECJQv/zox+ePEczZ+mWdZe5+wOC0K:QxCBim4dECy/Ex+enQZXw5n
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2000 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1804 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1804 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.execmd.exedescription pid process target process PID 1064 wrote to memory of 2000 1064 b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe cmd.exe PID 1064 wrote to memory of 2000 1064 b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe cmd.exe PID 1064 wrote to memory of 2000 1064 b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe cmd.exe PID 1064 wrote to memory of 2000 1064 b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe cmd.exe PID 2000 wrote to memory of 1804 2000 cmd.exe taskkill.exe PID 2000 wrote to memory of 1804 2000 cmd.exe taskkill.exe PID 2000 wrote to memory of 1804 2000 cmd.exe taskkill.exe PID 2000 wrote to memory of 1804 2000 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe"C:\Users\Admin\AppData\Local\Temp\b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-