Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
f83506d6903053d7cb3a3cf18fad72a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f83506d6903053d7cb3a3cf18fad72a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f83506d6903053d7cb3a3cf18fad72a0N.exe
-
Size
410KB
-
MD5
f83506d6903053d7cb3a3cf18fad72a0
-
SHA1
af0b8a751245d26bc9ad61062dd0366027eff3c1
-
SHA256
106f4196199e0bef0816cf89fa0f2b489cf633bd37a6524ad4d61015f2dc66b4
-
SHA512
262bcd4c0878694696b0df25e3749223c476b0b5239a1a0573cf803bb268500dfca58907d9d716690e3bdd7056c6e311cbea292bdf99399b44339e56a75a1510
-
SSDEEP
6144:L6dHwUpEuVLHBlvl949fsYeQogFuVBcRR8XIYLdsp2w4b+HGTWcPnkuG:L0wUpEAjbv749foQogFaX35w6+nknkV
Malware Config
Extracted
gcleaner
g-clean.in
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral1/memory/1368-2-0x0000000000220000-0x000000000026E000-memory.dmp family_onlylogger behavioral1/memory/1368-3-0x0000000000400000-0x0000000000452000-memory.dmp family_onlylogger behavioral1/memory/1368-4-0x0000000000400000-0x0000000000478000-memory.dmp family_onlylogger behavioral1/memory/1368-6-0x0000000000400000-0x0000000000452000-memory.dmp family_onlylogger behavioral1/memory/1368-5-0x0000000000220000-0x000000000026E000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
pid Process 2424 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f83506d6903053d7cb3a3cf18fad72a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 1940 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1940 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2424 1368 f83506d6903053d7cb3a3cf18fad72a0N.exe 28 PID 1368 wrote to memory of 2424 1368 f83506d6903053d7cb3a3cf18fad72a0N.exe 28 PID 1368 wrote to memory of 2424 1368 f83506d6903053d7cb3a3cf18fad72a0N.exe 28 PID 1368 wrote to memory of 2424 1368 f83506d6903053d7cb3a3cf18fad72a0N.exe 28 PID 2424 wrote to memory of 1940 2424 cmd.exe 30 PID 2424 wrote to memory of 1940 2424 cmd.exe 30 PID 2424 wrote to memory of 1940 2424 cmd.exe 30 PID 2424 wrote to memory of 1940 2424 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f83506d6903053d7cb3a3cf18fad72a0N.exe"C:\Users\Admin\AppData\Local\Temp\f83506d6903053d7cb3a3cf18fad72a0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "f83506d6903053d7cb3a3cf18fad72a0N.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\f83506d6903053d7cb3a3cf18fad72a0N.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "f83506d6903053d7cb3a3cf18fad72a0N.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-