Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win11-20231215-en
General
-
Target
425b312c607eaa405059b4928a65cba8.exe
-
Size
420KB
-
MD5
425b312c607eaa405059b4928a65cba8
-
SHA1
3caefbcad6d742e8c1849ec2d8ce092c0c75152f
-
SHA256
ea25dcf8f74b1d1094825d695807839f48230a800420cd2c57a05f7f6fe5a5bb
-
SHA512
89d9c201da31815db48bbb0fea5268044a412dac91677f8d9fc9a7ff1b9eec9d0c8b3c864b340148a22cacbd6b2e3a37dbfd94170ccba3d059ee261c402d1fa6
-
SSDEEP
12288:hET5GSUENyq2QSfyrVVM6O83C1+ZOXzh:aTXUENRFlZVMusYOj
Malware Config
Extracted
gcleaner
web-stat.biz
privatevolume.bi
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2940-3-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger behavioral1/memory/2940-4-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger behavioral1/memory/2940-2-0x00000000002F0000-0x000000000033C000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1996 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3056 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3056 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
425b312c607eaa405059b4928a65cba8.execmd.exedescription pid process target process PID 2940 wrote to memory of 1996 2940 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 2940 wrote to memory of 1996 2940 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 2940 wrote to memory of 1996 2940 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 2940 wrote to memory of 1996 2940 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 1996 wrote to memory of 3056 1996 cmd.exe taskkill.exe PID 1996 wrote to memory of 3056 1996 cmd.exe taskkill.exe PID 1996 wrote to memory of 3056 1996 cmd.exe taskkill.exe PID 1996 wrote to memory of 3056 1996 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3056