Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-01-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win11-20231215-en
General
-
Target
425b312c607eaa405059b4928a65cba8.exe
-
Size
420KB
-
MD5
425b312c607eaa405059b4928a65cba8
-
SHA1
3caefbcad6d742e8c1849ec2d8ce092c0c75152f
-
SHA256
ea25dcf8f74b1d1094825d695807839f48230a800420cd2c57a05f7f6fe5a5bb
-
SHA512
89d9c201da31815db48bbb0fea5268044a412dac91677f8d9fc9a7ff1b9eec9d0c8b3c864b340148a22cacbd6b2e3a37dbfd94170ccba3d059ee261c402d1fa6
-
SSDEEP
12288:hET5GSUENyq2QSfyrVVM6O83C1+ZOXzh:aTXUENRFlZVMusYOj
Malware Config
Extracted
gcleaner
web-stat.biz
privatevolume.bi
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4072-3-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger behavioral2/memory/4072-2-0x0000000000630000-0x000000000067C000-memory.dmp family_onlylogger behavioral2/memory/4072-5-0x0000000000630000-0x000000000067C000-memory.dmp family_onlylogger behavioral2/memory/4072-4-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2808 4072 WerFault.exe 425b312c607eaa405059b4928a65cba8.exe 3020 4072 WerFault.exe 425b312c607eaa405059b4928a65cba8.exe 412 4072 WerFault.exe 425b312c607eaa405059b4928a65cba8.exe 2300 4072 WerFault.exe 425b312c607eaa405059b4928a65cba8.exe 3304 4072 WerFault.exe 425b312c607eaa405059b4928a65cba8.exe 4548 4072 WerFault.exe 425b312c607eaa405059b4928a65cba8.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4520 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4520 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
425b312c607eaa405059b4928a65cba8.execmd.exedescription pid process target process PID 4072 wrote to memory of 2196 4072 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 4072 wrote to memory of 2196 4072 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 4072 wrote to memory of 2196 4072 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 2196 wrote to memory of 4520 2196 cmd.exe taskkill.exe PID 2196 wrote to memory of 4520 2196 cmd.exe taskkill.exe PID 2196 wrote to memory of 4520 2196 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 7402⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 7922⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 8362⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 8962⤵
- Program crash
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 8602⤵
- Program crash
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 8562⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4520