Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe
Resource
win7-20240508-en
General
-
Target
169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe
-
Size
266KB
-
MD5
f284dd5e52be29fecddaa61d0315de86
-
SHA1
292b5ee88bdd7929c4704f319b42792eef80cd03
-
SHA256
169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867
-
SHA512
d7d3c67255a5a257ab773b577f388451f9411d44187b24025d9170b4decbb7168d95b21facb7404db81c27753692445ae6c7fbcbcdd72aad7388df7cfb74ceec
-
SSDEEP
6144:i7OwR4FP5uTtYCPCGcJYENSMC1MmZCRJADT:NwmFP7cCGcJfSJAK
Malware Config
Extracted
gcleaner
185.172.128.90
185.172.128.69
-
url_path
/advdlc.php
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1784 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1784 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2420 1360 169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe 31 PID 1360 wrote to memory of 2420 1360 169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe 31 PID 1360 wrote to memory of 2420 1360 169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe 31 PID 1360 wrote to memory of 2420 1360 169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe 31 PID 2420 wrote to memory of 1784 2420 cmd.exe 33 PID 2420 wrote to memory of 1784 2420 cmd.exe 33 PID 2420 wrote to memory of 1784 2420 cmd.exe 33 PID 2420 wrote to memory of 1784 2420 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe"C:\Users\Admin\AppData\Local\Temp\169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "169307028293627766adc97df097a53ebbb57e03bb16a72bb1b54f5ae1be2867.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\advdlc[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99