Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 05:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe
Resource
win7-20240221-en
6 signatures
300 seconds
General
-
Target
a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe
-
Size
309KB
-
MD5
035a86cde472b63f395adef7c5b1bb1d
-
SHA1
6fd1db0b44281777a15fc484f96909e1ebe4b7bd
-
SHA256
a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42
-
SHA512
b488de13baa0959331be98e0751e8536a4ffe1e146ec295884b626ea5997af0ad35b040997a6cf3a86e868e4e31de8b8c06b3a37b415628e1e5ba8c47e726cac
-
SSDEEP
3072:w+SkMbpQj/HbpCcdwI6OXYh8YMFz/e8JAJLTq52TShUvk5fkkklE16SEtD/myerE:wPCj/boeTCw/jg/DeUv0Gvqyeb
Malware Config
Extracted
Family
gcleaner
C2
185.172.128.90
5.42.65.115
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2568 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2608 2340 a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe 28 PID 2340 wrote to memory of 2608 2340 a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe 28 PID 2340 wrote to memory of 2608 2340 a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe 28 PID 2340 wrote to memory of 2608 2340 a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe 28 PID 2608 wrote to memory of 2568 2608 cmd.exe 30 PID 2608 wrote to memory of 2568 2608 cmd.exe 30 PID 2608 wrote to memory of 2568 2608 cmd.exe 30 PID 2608 wrote to memory of 2568 2608 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe"C:\Users\Admin\AppData\Local\Temp\a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "a17a8c92f3f93c021513eb5578e43ad033fe7d22e6f8aaeee80cc6a3b6615a42.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-