Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-03-2023 14:36
Static task
static1
Behavioral task
behavioral1
Sample
42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe
Resource
win7-20230220-en
General
-
Target
42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe
-
Size
312KB
-
MD5
ae3afa452244676d55392d13204a9f67
-
SHA1
cbfb355b8cb2aad2ddeded588358491083bb2306
-
SHA256
42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282
-
SHA512
c6b2b5f5587fa78dba3f500e31e353f2fb28056ce4e031f377f4c4af7d6a9e8a1b548025954ed0c1b181f326003090e459b8c298416c136a3b8ebf3ec1cbc97d
-
SSDEEP
6144:q6xqXIQqjW59PnLC4NjserDQjwHgb8D7mpjY0GU:1oXIQqjsNnLC4NjXUqm8
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1324 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1220 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1220 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.execmd.exedescription pid process target process PID 848 wrote to memory of 1324 848 42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe cmd.exe PID 848 wrote to memory of 1324 848 42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe cmd.exe PID 848 wrote to memory of 1324 848 42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe cmd.exe PID 848 wrote to memory of 1324 848 42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe cmd.exe PID 1324 wrote to memory of 1220 1324 cmd.exe taskkill.exe PID 1324 wrote to memory of 1220 1324 cmd.exe taskkill.exe PID 1324 wrote to memory of 1220 1324 cmd.exe taskkill.exe PID 1324 wrote to memory of 1220 1324 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe"C:\Users\Admin\AppData\Local\Temp\42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "42e18100bc58d37f07f0c678a2a425dc4c1988f6a86cff80c456301789d58282.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-