Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-03-2023 15:48
Static task
static1
Behavioral task
behavioral1
Sample
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe
Resource
win7-20230220-en
General
-
Target
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe
-
Size
273KB
-
MD5
bfe0a34bb6494a9b1e866efe97ccd11b
-
SHA1
2222524e5bf603c3166ed445ae5f94f2ebe1fc6e
-
SHA256
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5
-
SHA512
9520cace14670c5aff3fcad7476c231d04b4a8b152f0af12cabbcc1a4947ca9007a2a65e3cf010e9a6dfd0f2388cc58def7d8e28338c3f516c0733613e28111c
-
SSDEEP
6144:5qgB6W89GHqzCzKDJUF3sIcqZi5WZbvEeTqa48Hd/:5qgB6bGHqzCGUF3niUHz485
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1772 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1124 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1124 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.execmd.exedescription pid process target process PID 1268 wrote to memory of 1772 1268 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe cmd.exe PID 1268 wrote to memory of 1772 1268 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe cmd.exe PID 1268 wrote to memory of 1772 1268 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe cmd.exe PID 1268 wrote to memory of 1772 1268 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe cmd.exe PID 1772 wrote to memory of 1124 1772 cmd.exe taskkill.exe PID 1772 wrote to memory of 1124 1772 cmd.exe taskkill.exe PID 1772 wrote to memory of 1124 1772 cmd.exe taskkill.exe PID 1772 wrote to memory of 1124 1772 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe"C:\Users\Admin\AppData\Local\Temp\8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-