Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 05:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe
Resource
win7-20231129-en
6 signatures
300 seconds
General
-
Target
9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe
-
Size
301KB
-
MD5
f9050f067f6edefccfc74b05636e2d4b
-
SHA1
401fdf44e020961d1c75c2507efa413cf6b84ce6
-
SHA256
9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4
-
SHA512
948a6c7b77e4dd67c6c71a7b0cd60368deeb018204da1af42547c2538fd11753651b4965134cbce5ef7034d530727f87c546676b576d85a547bef5e9abb279f4
-
SSDEEP
3072:1ZEnJY5lR/1ZRj5jG4irk6c8MkerObsI7w5jwZ0iK75E:+JuRNJq4Wkdr+Zuwng
Malware Config
Extracted
Family
gcleaner
C2
185.172.128.90
5.42.65.64
Attributes
-
url_path
/advdlc.php
Signatures
-
Deletes itself 1 IoCs
pid Process 2260 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2564 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2564 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2260 2180 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2180 wrote to memory of 2260 2180 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2180 wrote to memory of 2260 2180 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2180 wrote to memory of 2260 2180 9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe 28 PID 2260 wrote to memory of 2564 2260 cmd.exe 30 PID 2260 wrote to memory of 2564 2260 cmd.exe 30 PID 2260 wrote to memory of 2564 2260 cmd.exe 30 PID 2260 wrote to memory of 2564 2260 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe"C:\Users\Admin\AppData\Local\Temp\9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "9ab2417cf513faf0321ad42ca3119429af832262c777fa032d5f30cea4fc4ba4.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-