Resubmissions
19/04/2023, 10:12
230419-l8kdpabf9z 1019/04/2023, 09:14
230419-k7qcwahe75 1018/04/2023, 11:36
230418-nqkylsch3z 10Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2023, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
1e0c04259041599f381739e5a2779118.exe
Resource
win7-20230220-en
General
-
Target
1e0c04259041599f381739e5a2779118.exe
-
Size
282KB
-
MD5
1e0c04259041599f381739e5a2779118
-
SHA1
4aeec9e7e2d836ef69145a8451410b49d7ee8139
-
SHA256
71dfa64187315a09becab456d32e70e43ae68afbff5a601a9227089241b9c460
-
SHA512
bb1f4f064a0f7da8a7cf2aae2f7eb8687bf8f4861e168a97c4e31bced31341d552419bc96d254e11237c1227fc3836ebc802eff7af6a399a2bab62b94d3e275d
-
SSDEEP
3072:kcJiBxMfexCJCzAU0tPjv4UVA3oG+dHLnVTuX2kmo5ugsFWrO7CCFpPsOmmh16Pq:axaUCJCIjASGoGoOMF7+QpppObl7iM
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
pid Process 588 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 824 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 824 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1256 wrote to memory of 588 1256 1e0c04259041599f381739e5a2779118.exe 30 PID 1256 wrote to memory of 588 1256 1e0c04259041599f381739e5a2779118.exe 30 PID 1256 wrote to memory of 588 1256 1e0c04259041599f381739e5a2779118.exe 30 PID 1256 wrote to memory of 588 1256 1e0c04259041599f381739e5a2779118.exe 30 PID 588 wrote to memory of 824 588 cmd.exe 32 PID 588 wrote to memory of 824 588 cmd.exe 32 PID 588 wrote to memory of 824 588 cmd.exe 32 PID 588 wrote to memory of 824 588 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exeC:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exe /chk,hell1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1e0c04259041599f381739e5a2779118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1e0c04259041599f381739e5a2779118.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-