Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2023 12:35
Static task
static1
Behavioral task
behavioral1
Sample
c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe
Resource
win7-20230220-en
General
-
Target
c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe
-
Size
2.0MB
-
MD5
c46b7303472b5aaf444c210138079f49
-
SHA1
08786e730e7534c8cd6c2b46fc5a5b010b61cccc
-
SHA256
c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3
-
SHA512
22488e2bca53721622e05b5a8b2315f7b4d9c370f6f90ec080ef3663bffe40be34a7d72f9f88c9ad9c248b67ca06f640c4d9920328ff22c8d02c6b839b27267b
-
SSDEEP
49152:B23LLyd9mRi0cqgdM1GqnW7ae9JXWkd31E6pJ43OtBV3Y11P0:E3LLyd98i7qgdM1oeezr1E6H9tBVo11
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmpLitFiles133.exeePok07hAxhlmS.exepid process 2212 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp 180 LitFiles133.exe 4308 ePok07hAxhlmS.exe -
Loads dropped DLL 1 IoCs
Processes:
c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmppid process 2212 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
Processes:
c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmpdescription ioc process File created C:\Program Files (x86)\Split Files\language\is-QCT1C.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\is-1HNEG.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-JJPLA.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\is-C4DL5.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-2AS34.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-8BP2S.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\is-4F92H.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\unins000.dat c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-BGJ4B.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\is-0EJQ5.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File opened for modification C:\Program Files (x86)\Split Files\unins000.dat c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File opened for modification C:\Program Files (x86)\Split Files\LitFiles133.exe c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\is-SP7KF.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-PJUFE.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-9TJED.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-JUKMH.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp File created C:\Program Files (x86)\Split Files\language\is-FD4JU.tmp c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
LitFiles133.exepid process 180 LitFiles133.exe 180 LitFiles133.exe 180 LitFiles133.exe 180 LitFiles133.exe 180 LitFiles133.exe 180 LitFiles133.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
LitFiles133.exepid process 180 LitFiles133.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exec083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmpLitFiles133.exedescription pid process target process PID 3184 wrote to memory of 2212 3184 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp PID 3184 wrote to memory of 2212 3184 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp PID 3184 wrote to memory of 2212 3184 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp PID 2212 wrote to memory of 180 2212 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp LitFiles133.exe PID 2212 wrote to memory of 180 2212 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp LitFiles133.exe PID 2212 wrote to memory of 180 2212 c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp LitFiles133.exe PID 180 wrote to memory of 4308 180 LitFiles133.exe ePok07hAxhlmS.exe PID 180 wrote to memory of 4308 180 LitFiles133.exe ePok07hAxhlmS.exe PID 180 wrote to memory of 4308 180 LitFiles133.exe ePok07hAxhlmS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe"C:\Users\Admin\AppData\Local\Temp\c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\is-KM2LU.tmp\c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp"C:\Users\Admin\AppData\Local\Temp\is-KM2LU.tmp\c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp" /SL5="$A0050,1733667,182784,C:\Users\Admin\AppData\Local\Temp\c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Split Files\LitFiles133.exe"C:\Program Files (x86)\Split Files\LitFiles133.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Roaming\{7f74da3b-b191-11ed-abe8-806e6f6e6963}\ePok07hAxhlmS.exe
- Executes dropped EXE
PID:4308
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5d9bd4ff6a2fffa64d20fead062d1d3b4
SHA10defe88417dff079750863307b33fe1926e9a33d
SHA256f06372070f6b544747e00dae45d0d01af67c4f4b9aa82c0d1518a44714c4c248
SHA512c9a93ab4d119b9f3b9f8227821253d746ebc93a97df6bf56b45c1b00a58027f63f86866f3ffa3ad1e00a774295155d962d20b68e9fe868a61c617771f2da16d2
-
Filesize
3.2MB
MD5d9bd4ff6a2fffa64d20fead062d1d3b4
SHA10defe88417dff079750863307b33fe1926e9a33d
SHA256f06372070f6b544747e00dae45d0d01af67c4f4b9aa82c0d1518a44714c4c248
SHA512c9a93ab4d119b9f3b9f8227821253d746ebc93a97df6bf56b45c1b00a58027f63f86866f3ffa3ad1e00a774295155d962d20b68e9fe868a61c617771f2da16d2
-
C:\Users\Admin\AppData\Local\Temp\is-KM2LU.tmp\c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp
Filesize820KB
MD5c918c18c921ab538c31033c0a4478e51
SHA1cc468af59f91bac824f994361d20c90edddf0604
SHA2569c5872756fa6fb90c382f47a7d768237fad13c4464f0fe0996808c79ffc56e60
SHA512fc9ced5ab7dfafc794606faf5ac426af67361ef3c30fbb6fd993c77abf2ee15cfd86f9913c89b0f36afa4b7decc748418ab18c4b72a1d885b0e8b1ab71d27c6b
-
C:\Users\Admin\AppData\Local\Temp\is-KM2LU.tmp\c083228d34758c9cef968fe6f448f230ae5cabf273ae22508a5c8810208034c3.tmp
Filesize820KB
MD5c918c18c921ab538c31033c0a4478e51
SHA1cc468af59f91bac824f994361d20c90edddf0604
SHA2569c5872756fa6fb90c382f47a7d768237fad13c4464f0fe0996808c79ffc56e60
SHA512fc9ced5ab7dfafc794606faf5ac426af67361ef3c30fbb6fd993c77abf2ee15cfd86f9913c89b0f36afa4b7decc748418ab18c4b72a1d885b0e8b1ab71d27c6b
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c