Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 06:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
206f7bf98269d08b4cb9aaa0a97214e0.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
206f7bf98269d08b4cb9aaa0a97214e0.exe
-
Size
350KB
-
MD5
206f7bf98269d08b4cb9aaa0a97214e0
-
SHA1
f827a30d0354844bd965135dc2e652f33986b8de
-
SHA256
8d8369a5383653ff8f891ac08546aaf807fe2d3d355a04f5ce8f4b22ca78685e
-
SHA512
965b3f862f397dfed544cacd4ea98ef653811d40fcb073272350583b3552746c1c7057124e8ee0c63b00d64e094ffba359bc71b7afb20fdfb04ddbfff985c889
-
SSDEEP
3072:WbdohbCWGrOnG+E6MzRZh+5o8WMv9vMV/8ZH59Gb/wHsZCJOFZJY/QnvyVxgpG:flx88G2fBc/G5gb/wHsIJO6/svy
Malware Config
Extracted
Family
gcleaner
C2
185.172.128.90
5.42.65.64
Attributes
-
url_path
/advdlc.php
Signatures
-
Deletes itself 1 IoCs
pid Process 2184 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2560 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2560 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2184 2352 206f7bf98269d08b4cb9aaa0a97214e0.exe 28 PID 2352 wrote to memory of 2184 2352 206f7bf98269d08b4cb9aaa0a97214e0.exe 28 PID 2352 wrote to memory of 2184 2352 206f7bf98269d08b4cb9aaa0a97214e0.exe 28 PID 2352 wrote to memory of 2184 2352 206f7bf98269d08b4cb9aaa0a97214e0.exe 28 PID 2184 wrote to memory of 2560 2184 cmd.exe 30 PID 2184 wrote to memory of 2560 2184 cmd.exe 30 PID 2184 wrote to memory of 2560 2184 cmd.exe 30 PID 2184 wrote to memory of 2560 2184 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\206f7bf98269d08b4cb9aaa0a97214e0.exe"C:\Users\Admin\AppData\Local\Temp\206f7bf98269d08b4cb9aaa0a97214e0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "206f7bf98269d08b4cb9aaa0a97214e0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\206f7bf98269d08b4cb9aaa0a97214e0.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "206f7bf98269d08b4cb9aaa0a97214e0.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-