Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-03-2023 15:48
Static task
static1
Behavioral task
behavioral1
Sample
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe
Resource
win7-20230220-en
General
-
Target
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe
-
Size
331KB
-
MD5
2cb08ca754964460e0c6d81e1250c974
-
SHA1
7f62b1284addc0f579b2ca240352027711d021f0
-
SHA256
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3
-
SHA512
c00361862d1977e1a591a0a2ef21bc35aee37a97ff55ecffeb632a850000456613d497fa76e23a7e676473fd9a4bc325a0443a7bcf95fda512e3a08e314785ad
-
SSDEEP
6144:H5XlqHQCFVZqVFbFso4D3N/B3yoGkaFtZWfdW4TE3v1144C0K:H9sHQCFVQVFb095CGaFtZ4dW1cn
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1816 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1708 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1708 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.execmd.exedescription pid process target process PID 1716 wrote to memory of 1816 1716 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 1716 wrote to memory of 1816 1716 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 1716 wrote to memory of 1816 1716 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 1716 wrote to memory of 1816 1716 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 1816 wrote to memory of 1708 1816 cmd.exe taskkill.exe PID 1816 wrote to memory of 1708 1816 cmd.exe taskkill.exe PID 1816 wrote to memory of 1708 1816 cmd.exe taskkill.exe PID 1816 wrote to memory of 1708 1816 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe"C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-