Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
298b615f97b36d6b46a664b2df69c730N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
298b615f97b36d6b46a664b2df69c730N.exe
Resource
win10v2004-20240802-en
General
-
Target
298b615f97b36d6b46a664b2df69c730N.exe
-
Size
494KB
-
MD5
298b615f97b36d6b46a664b2df69c730
-
SHA1
5588d15c5d6b4b4b34d6a2fdd3010c9401559b53
-
SHA256
2ea8cea35b0ea91fabe87a7969b57c824e972b4734b167af69843c284248b4ad
-
SHA512
e42222f9898c40c12e8c14cff688a7cf111abcf9528cc3ef86dfa100a574bcdd7b98c13e8076f88216f66bc0663287e26c95970cb4e895105abbbf113073a4e4
-
SSDEEP
12288:PXyzmAnZNMql8BxUPJBAmGnd52ZWDj/wEP4vA3/AJZ:AnZNzl8qFGd5WW/pf/Y
Malware Config
Extracted
gcleaner
g-clean.in
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral1/memory/3008-2-0x0000000000220000-0x000000000026E000-memory.dmp family_onlylogger behavioral1/memory/3008-3-0x0000000000400000-0x0000000000452000-memory.dmp family_onlylogger behavioral1/memory/3008-5-0x0000000000220000-0x000000000026E000-memory.dmp family_onlylogger behavioral1/memory/3008-6-0x0000000000400000-0x0000000000452000-memory.dmp family_onlylogger behavioral1/memory/3008-4-0x0000000000400000-0x0000000000873000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
pid Process 2176 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 298b615f97b36d6b46a664b2df69c730N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2784 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2176 3008 298b615f97b36d6b46a664b2df69c730N.exe 30 PID 3008 wrote to memory of 2176 3008 298b615f97b36d6b46a664b2df69c730N.exe 30 PID 3008 wrote to memory of 2176 3008 298b615f97b36d6b46a664b2df69c730N.exe 30 PID 3008 wrote to memory of 2176 3008 298b615f97b36d6b46a664b2df69c730N.exe 30 PID 2176 wrote to memory of 2784 2176 cmd.exe 32 PID 2176 wrote to memory of 2784 2176 cmd.exe 32 PID 2176 wrote to memory of 2784 2176 cmd.exe 32 PID 2176 wrote to memory of 2784 2176 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\298b615f97b36d6b46a664b2df69c730N.exe"C:\Users\Admin\AppData\Local\Temp\298b615f97b36d6b46a664b2df69c730N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "298b615f97b36d6b46a664b2df69c730N.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\298b615f97b36d6b46a664b2df69c730N.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "298b615f97b36d6b46a664b2df69c730N.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-