Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-03-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
d0d4119491bc24c9de6456efad90af5a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d0d4119491bc24c9de6456efad90af5a.exe
Resource
win10v2004-20240226-en
General
-
Target
d0d4119491bc24c9de6456efad90af5a.exe
-
Size
362KB
-
MD5
d0d4119491bc24c9de6456efad90af5a
-
SHA1
fd71a1ac303f987523cfcdc18b1e46f570b19870
-
SHA256
f7f7c01729574811e2a4e5c97beebbc1167b41050bc8bf86df72c47b33fb4e74
-
SHA512
72778773b3d81aeb85460f5944d8eadcab51f723a46ebd8eefb04870fae6fdebca029dfb08e0372837600dda04db59de4656a3e6a625eddafda63ec62a28a96a
-
SSDEEP
6144:i23kVFbeYRM0CwNTkXMzWmK8Aj9Bnj5t6Q+GgE73nPvg7:LgleYRM09Tk8zWmhSDFt6Qzzg
Malware Config
Extracted
gcleaner
194.145.227.161
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 3 IoCs
resource yara_rule behavioral1/memory/2428-2-0x0000000000220000-0x0000000000268000-memory.dmp family_onlylogger behavioral1/memory/2428-3-0x0000000000400000-0x0000000002B66000-memory.dmp family_onlylogger behavioral1/memory/2428-4-0x0000000000400000-0x0000000002B66000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2540 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2912 2428 d0d4119491bc24c9de6456efad90af5a.exe 28 PID 2428 wrote to memory of 2912 2428 d0d4119491bc24c9de6456efad90af5a.exe 28 PID 2428 wrote to memory of 2912 2428 d0d4119491bc24c9de6456efad90af5a.exe 28 PID 2428 wrote to memory of 2912 2428 d0d4119491bc24c9de6456efad90af5a.exe 28 PID 2912 wrote to memory of 2540 2912 cmd.exe 30 PID 2912 wrote to memory of 2540 2912 cmd.exe 30 PID 2912 wrote to memory of 2540 2912 cmd.exe 30 PID 2912 wrote to memory of 2540 2912 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0d4119491bc24c9de6456efad90af5a.exe"C:\Users\Admin\AppData\Local\Temp\d0d4119491bc24c9de6456efad90af5a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "d0d4119491bc24c9de6456efad90af5a.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\d0d4119491bc24c9de6456efad90af5a.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "d0d4119491bc24c9de6456efad90af5a.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-