Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe
Resource
win7-20240221-en
General
-
Target
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe
-
Size
267KB
-
MD5
0afa53d803373c11a881b62d87a1a94c
-
SHA1
d487534e1ac395a4733432952226e2f71fb44c48
-
SHA256
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5
-
SHA512
f5855758ea368d1a11d2e546b3e73086809232259a30aff51d68761da1a3bc8dcc62e9fa508a8b864f5a073a728c61406fcd163562944849f15aa12a579f4850
-
SSDEEP
6144:nDKYzzaDV6jRyLmgomqi3I08Q2ZvquhTWUrY:nnzOxgRbbmd49NZZ
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2684 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2164 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2164 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.execmd.exedescription pid process target process PID 2508 wrote to memory of 2684 2508 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 2508 wrote to memory of 2684 2508 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 2508 wrote to memory of 2684 2508 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 2508 wrote to memory of 2684 2508 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 2684 wrote to memory of 2164 2684 cmd.exe taskkill.exe PID 2684 wrote to memory of 2164 2684 cmd.exe taskkill.exe PID 2684 wrote to memory of 2164 2684 cmd.exe taskkill.exe PID 2684 wrote to memory of 2164 2684 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe"C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2508-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2508-2-0x0000000000220000-0x000000000025C000-memory.dmpFilesize
240KB
-
memory/2508-1-0x0000000002DF0000-0x0000000002EF0000-memory.dmpFilesize
1024KB
-
memory/2508-7-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2508-8-0x0000000002DF0000-0x0000000002EF0000-memory.dmpFilesize
1024KB
-
memory/2508-6-0x0000000000400000-0x0000000002CA1000-memory.dmpFilesize
40.6MB