Analysis
-
max time kernel
102s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
298b615f97b36d6b46a664b2df69c730N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
298b615f97b36d6b46a664b2df69c730N.exe
Resource
win10v2004-20240802-en
General
-
Target
298b615f97b36d6b46a664b2df69c730N.exe
-
Size
494KB
-
MD5
298b615f97b36d6b46a664b2df69c730
-
SHA1
5588d15c5d6b4b4b34d6a2fdd3010c9401559b53
-
SHA256
2ea8cea35b0ea91fabe87a7969b57c824e972b4734b167af69843c284248b4ad
-
SHA512
e42222f9898c40c12e8c14cff688a7cf111abcf9528cc3ef86dfa100a574bcdd7b98c13e8076f88216f66bc0663287e26c95970cb4e895105abbbf113073a4e4
-
SSDEEP
12288:PXyzmAnZNMql8BxUPJBAmGnd52ZWDj/wEP4vA3/AJZ:AnZNzl8qFGd5WW/pf/Y
Malware Config
Extracted
gcleaner
g-clean.in
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/3856-2-0x00000000008F0000-0x000000000093E000-memory.dmp family_onlylogger behavioral2/memory/3856-3-0x0000000000400000-0x0000000000452000-memory.dmp family_onlylogger behavioral2/memory/3856-5-0x00000000008F0000-0x000000000093E000-memory.dmp family_onlylogger behavioral2/memory/3856-6-0x0000000000400000-0x0000000000452000-memory.dmp family_onlylogger behavioral2/memory/3856-4-0x0000000000400000-0x0000000000873000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 298b615f97b36d6b46a664b2df69c730N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 5060 3856 WerFault.exe 83 4256 3856 WerFault.exe 83 208 3856 WerFault.exe 83 1616 3856 WerFault.exe 83 1900 3856 WerFault.exe 83 4792 3856 WerFault.exe 83 3752 3856 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 298b615f97b36d6b46a664b2df69c730N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2404 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2404 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3856 wrote to memory of 1304 3856 298b615f97b36d6b46a664b2df69c730N.exe 105 PID 3856 wrote to memory of 1304 3856 298b615f97b36d6b46a664b2df69c730N.exe 105 PID 3856 wrote to memory of 1304 3856 298b615f97b36d6b46a664b2df69c730N.exe 105 PID 1304 wrote to memory of 2404 1304 cmd.exe 109 PID 1304 wrote to memory of 2404 1304 cmd.exe 109 PID 1304 wrote to memory of 2404 1304 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\298b615f97b36d6b46a664b2df69c730N.exe"C:\Users\Admin\AppData\Local\Temp\298b615f97b36d6b46a664b2df69c730N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 7082⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 7842⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 9202⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 7242⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 9362⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 9322⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "298b615f97b36d6b46a664b2df69c730N.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\298b615f97b36d6b46a664b2df69c730N.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "298b615f97b36d6b46a664b2df69c730N.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 9802⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3856 -ip 38561⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3856 -ip 38561⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3856 -ip 38561⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3856 -ip 38561⤵PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3856 -ip 38561⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3856 -ip 38561⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3856 -ip 38561⤵PID:944