Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 22:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe
Resource
win7-20240220-en
6 signatures
300 seconds
General
-
Target
9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe
-
Size
301KB
-
MD5
f9050f067f6edefccfc74b05636e2d4b
-
SHA1
401fdf44e020961d1c75c2507efa413cf6b84ce6
-
SHA256
9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4
-
SHA512
948a6c7b77e4dd67c6c71a7b0cd60368deeb018204da1af42547c2538fd11753651b4965134cbce5ef7034d530727f87c546676b576d85a547bef5e9abb279f4
-
SSDEEP
3072:1ZEnJY5lR/1ZRj5jG4irk6c8MkerObsI7w5jwZ0iK75E:+JuRNJq4Wkdr+Zuwng
Malware Config
Extracted
Family
gcleaner
C2
185.172.128.90
5.42.65.64
Attributes
-
url_path
/advdlc.php
Signatures
-
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2664 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2664 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2568 2300 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2300 wrote to memory of 2568 2300 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2300 wrote to memory of 2568 2300 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2300 wrote to memory of 2568 2300 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2568 wrote to memory of 2664 2568 cmd.exe 30 PID 2568 wrote to memory of 2664 2568 cmd.exe 30 PID 2568 wrote to memory of 2664 2568 cmd.exe 30 PID 2568 wrote to memory of 2664 2568 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe"C:\Users\Admin\AppData\Local\Temp\9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-