Resubmissions
19-04-2023 10:12
230419-l8kdpabf9z 1019-04-2023 09:14
230419-k7qcwahe75 1018-04-2023 11:36
230418-nqkylsch3z 10Analysis
-
max time kernel
881s -
max time network
885s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-04-2023 10:12
Static task
static1
Behavioral task
behavioral1
Sample
1e0c04259041599f381739e5a2779118.exe
Resource
win7-20230220-en
General
-
Target
1e0c04259041599f381739e5a2779118.exe
-
Size
282KB
-
MD5
1e0c04259041599f381739e5a2779118
-
SHA1
4aeec9e7e2d836ef69145a8451410b49d7ee8139
-
SHA256
71dfa64187315a09becab456d32e70e43ae68afbff5a601a9227089241b9c460
-
SHA512
bb1f4f064a0f7da8a7cf2aae2f7eb8687bf8f4861e168a97c4e31bced31341d552419bc96d254e11237c1227fc3836ebc802eff7af6a399a2bab62b94d3e275d
-
SSDEEP
3072:kcJiBxMfexCJCzAU0tPjv4UVA3oG+dHLnVTuX2kmo5ugsFWrO7CCFpPsOmmh16Pq:axaUCJCIjASGoGoOMF7+QpppObl7iM
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Deletes itself 1 IoCs
pid Process 1000 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1804 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1804 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 880 wrote to memory of 1000 880 1e0c04259041599f381739e5a2779118.exe 30 PID 880 wrote to memory of 1000 880 1e0c04259041599f381739e5a2779118.exe 30 PID 880 wrote to memory of 1000 880 1e0c04259041599f381739e5a2779118.exe 30 PID 880 wrote to memory of 1000 880 1e0c04259041599f381739e5a2779118.exe 30 PID 1000 wrote to memory of 1804 1000 cmd.exe 32 PID 1000 wrote to memory of 1804 1000 cmd.exe 32 PID 1000 wrote to memory of 1804 1000 cmd.exe 32 PID 1000 wrote to memory of 1804 1000 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exeC:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exe mixfive eu1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1e0c04259041599f381739e5a2779118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1e0c04259041599f381739e5a2779118.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-