Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe
Resource
win7-20240508-en
General
-
Target
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe
-
Size
255KB
-
MD5
12068b3c709689a76e7432ded539ab7c
-
SHA1
579515827d3db8f7a6c7fda2a3d68274538d7179
-
SHA256
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a
-
SHA512
842b4b4adb51a8ba20748bd777cd413cb1f1254ae10f7f372b10374b6afe360e8e1eebf4ffccc524ba5b3d15280d2b408d6bb36f9b6a617c194784ac248697db
-
SSDEEP
6144:aehwWf8SYTepVWgv2YwRh9SDXgcj36+iMZ40:fhwWf8ApURVhiXgcb6Mq0
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2384 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2724 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2724 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.execmd.exedescription pid process target process PID 1848 wrote to memory of 2384 1848 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe cmd.exe PID 1848 wrote to memory of 2384 1848 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe cmd.exe PID 1848 wrote to memory of 2384 1848 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe cmd.exe PID 1848 wrote to memory of 2384 1848 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe cmd.exe PID 2384 wrote to memory of 2724 2384 cmd.exe taskkill.exe PID 2384 wrote to memory of 2724 2384 cmd.exe taskkill.exe PID 2384 wrote to memory of 2724 2384 cmd.exe taskkill.exe PID 2384 wrote to memory of 2724 2384 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe"C:\Users\Admin\AppData\Local\Temp\3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2724