Analysis
-
max time kernel
186s -
max time network
225s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win11-20231215-en
General
-
Target
425b312c607eaa405059b4928a65cba8.exe
-
Size
420KB
-
MD5
425b312c607eaa405059b4928a65cba8
-
SHA1
3caefbcad6d742e8c1849ec2d8ce092c0c75152f
-
SHA256
ea25dcf8f74b1d1094825d695807839f48230a800420cd2c57a05f7f6fe5a5bb
-
SHA512
89d9c201da31815db48bbb0fea5268044a412dac91677f8d9fc9a7ff1b9eec9d0c8b3c864b340148a22cacbd6b2e3a37dbfd94170ccba3d059ee261c402d1fa6
-
SSDEEP
12288:hET5GSUENyq2QSfyrVVM6O83C1+ZOXzh:aTXUENRFlZVMusYOj
Malware Config
Extracted
gcleaner
web-stat.biz
privatevolume.bi
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 4 IoCs
resource yara_rule behavioral3/memory/2056-2-0x00000000021D0000-0x000000000221C000-memory.dmp family_onlylogger behavioral3/memory/2056-3-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger behavioral3/memory/2056-8-0x00000000021D0000-0x000000000221C000-memory.dmp family_onlylogger behavioral3/memory/2056-16-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 425b312c607eaa405059b4928a65cba8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1688 2056 WerFault.exe 89 1612 2056 WerFault.exe 89 5084 2056 WerFault.exe 89 932 2056 WerFault.exe 89 4404 2056 WerFault.exe 89 4392 2056 WerFault.exe 89 2428 2056 WerFault.exe 89 4608 2056 WerFault.exe 89 -
Kills process with taskkill 1 IoCs
pid Process 180 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 180 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 408 2056 425b312c607eaa405059b4928a65cba8.exe 117 PID 2056 wrote to memory of 408 2056 425b312c607eaa405059b4928a65cba8.exe 117 PID 2056 wrote to memory of 408 2056 425b312c607eaa405059b4928a65cba8.exe 117 PID 408 wrote to memory of 180 408 cmd.exe 120 PID 408 wrote to memory of 180 408 cmd.exe 120 PID 408 wrote to memory of 180 408 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 7362⤵
- Program crash
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 8122⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 9282⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 9402⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 9482⤵
- Program crash
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 9682⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 9722⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 7282⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2056 -ip 20561⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2056 -ip 20561⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2056 -ip 20561⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2056 -ip 20561⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2056 -ip 20561⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2056 -ip 20561⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2056 -ip 20561⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2056 -ip 20561⤵PID:4896