Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-03-2023 18:30
Static task
static1
Behavioral task
behavioral1
Sample
ae3afa452244676d55392d13204a9f67.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ae3afa452244676d55392d13204a9f67.exe
-
Size
312KB
-
MD5
ae3afa452244676d55392d13204a9f67
-
SHA1
cbfb355b8cb2aad2ddeded588358491083bb2306
-
SHA256
42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282
-
SHA512
c6b2b5f5587fa78dba3f500e31e353f2fb28056ce4e031f377f4c4af7d6a9e8a1b548025954ed0c1b181f326003090e459b8c298416c136a3b8ebf3ec1cbc97d
-
SSDEEP
6144:q6xqXIQqjW59PnLC4NjserDQjwHgb8D7mpjY0GU:1oXIQqjsNnLC4NjXUqm8
Malware Config
Extracted
Family
gcleaner
C2
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1184 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1416 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1416 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ae3afa452244676d55392d13204a9f67.execmd.exedescription pid process target process PID 836 wrote to memory of 1184 836 ae3afa452244676d55392d13204a9f67.exe cmd.exe PID 836 wrote to memory of 1184 836 ae3afa452244676d55392d13204a9f67.exe cmd.exe PID 836 wrote to memory of 1184 836 ae3afa452244676d55392d13204a9f67.exe cmd.exe PID 836 wrote to memory of 1184 836 ae3afa452244676d55392d13204a9f67.exe cmd.exe PID 1184 wrote to memory of 1416 1184 cmd.exe taskkill.exe PID 1184 wrote to memory of 1416 1184 cmd.exe taskkill.exe PID 1184 wrote to memory of 1416 1184 cmd.exe taskkill.exe PID 1184 wrote to memory of 1416 1184 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae3afa452244676d55392d13204a9f67.exe"C:\Users\Admin\AppData\Local\Temp\ae3afa452244676d55392d13204a9f67.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ae3afa452244676d55392d13204a9f67.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ae3afa452244676d55392d13204a9f67.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ae3afa452244676d55392d13204a9f67.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-