Resubmissions

07/01/2024, 18:07 UTC

240107-wqhr9abfcn 10

15/01/2022, 08:40 UTC

220115-kkxhnsdham 10

Analysis

  • max time kernel
    131s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/01/2024, 18:07 UTC

General

  • Target

    084867eab2023c445721b0cd205ce47a.exe

  • Size

    419KB

  • MD5

    084867eab2023c445721b0cd205ce47a

  • SHA1

    0f465ee53425b4c9a963f6ecfe1119840fa810d7

  • SHA256

    5d9dc24f2de724f0921574f0589d39f79cbdd85cc817a6345267aa9aa9632a2b

  • SHA512

    58ec053935a7d8e2f206f3ecf76ab575dcf95736f1f23c2b8944ff4e5c31b3f6faaef20cd959a8206003c298e82770f456261a3122f815dd6347f08dd1992c3c

  • SSDEEP

    6144:pryICqvsNS64vmvH3uSlMe1DjJY4aUWXCZnMDHzfA2PjdlIJfD0:pryIC2SHhMexi48y1MDTfA2dlq

Malware Config

Extracted

Family

gcleaner

C2

web-stat.biz

privatevolume.bi

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • OnlyLogger payload 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\084867eab2023c445721b0cd205ce47a.exe
    "C:\Users\Admin\AppData\Local\Temp\084867eab2023c445721b0cd205ce47a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 744
      2⤵
      • Program crash
      PID:212
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 792
      2⤵
      • Program crash
      PID:2964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 748
      2⤵
      • Program crash
      PID:4028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 880
      2⤵
      • Program crash
      PID:3172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 940
      2⤵
      • Program crash
      PID:2684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 980
      2⤵
      • Program crash
      PID:3788
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im "084867eab2023c445721b0cd205ce47a.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\084867eab2023c445721b0cd205ce47a.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im "084867eab2023c445721b0cd205ce47a.exe" /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4600

Network

  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    213.143.182.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    213.143.182.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    189.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    189.178.17.96.in-addr.arpa
    IN PTR
    Response
    189.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-189deploystaticakamaitechnologiescom
No results found
  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    213.143.182.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    213.143.182.52.in-addr.arpa

  • 8.8.8.8:53
    189.178.17.96.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    189.178.17.96.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3704-1-0x0000000000670000-0x0000000000770000-memory.dmp

    Filesize

    1024KB

  • memory/3704-2-0x00000000005E0000-0x000000000062C000-memory.dmp

    Filesize

    304KB

  • memory/3704-3-0x0000000000400000-0x0000000000579000-memory.dmp

    Filesize

    1.5MB

  • memory/3704-4-0x0000000000400000-0x0000000000579000-memory.dmp

    Filesize

    1.5MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.