Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe
Resource
win7-20240903-en
General
-
Target
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe
-
Size
3.3MB
-
MD5
cf3090e3b1ef89b074a1abc416b264f0
-
SHA1
c15b5c72185c43d1e3aa4e3727e579fccfba1906
-
SHA256
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c
-
SHA512
40bde43cef15b70df1c9e194df25b91abfa9d4b5c7bdb0d25b757404725f0ef0f705b985dde78522fc2bfb0bd1e419dc339a76c201ccafb3d48c02a00b606c2f
-
SSDEEP
98304:m0tFNMxDHrKZ6Qu9Pw98m887AbCs7CWjRs90:m0tFNMxDLKZx0
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
KvuHwhQoHPY7SQ.exepid process 3032 KvuHwhQoHPY7SQ.exe -
Loads dropped DLL 1 IoCs
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exepid process 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exepid process 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exepid process 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exedescription pid process target process PID 2388 wrote to memory of 3032 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe KvuHwhQoHPY7SQ.exe PID 2388 wrote to memory of 3032 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe KvuHwhQoHPY7SQ.exe PID 2388 wrote to memory of 3032 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe KvuHwhQoHPY7SQ.exe PID 2388 wrote to memory of 3032 2388 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe KvuHwhQoHPY7SQ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe"C:\Users\Admin\AppData\Local\Temp\3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\{846ee340-7039-11de-9d20-806e6f6e6963}\KvuHwhQoHPY7SQ.exe
- Executes dropped EXE
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c