Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 20:03

General

  • Target

    3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe

  • Size

    3.3MB

  • MD5

    cf3090e3b1ef89b074a1abc416b264f0

  • SHA1

    c15b5c72185c43d1e3aa4e3727e579fccfba1906

  • SHA256

    3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c

  • SHA512

    40bde43cef15b70df1c9e194df25b91abfa9d4b5c7bdb0d25b757404725f0ef0f705b985dde78522fc2bfb0bd1e419dc339a76c201ccafb3d48c02a00b606c2f

  • SSDEEP

    98304:m0tFNMxDHrKZ6Qu9Pw98m887AbCs7CWjRs90:m0tFNMxDLKZx0

Malware Config

Extracted

Family

gcleaner

C2

45.139.105.171

85.31.46.167

107.182.129.235

171.22.30.106

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe
    "C:\Users\Admin\AppData\Local\Temp\3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Roaming\{8b5c0330-510d-11ef-ac57-806e6f6e6963}\ymIv7VdUSn.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{8b5c0330-510d-11ef-ac57-806e6f6e6963}\ymIv7VdUSn.exe

    Filesize

    72KB

    MD5

    3fb36cb0b7172e5298d2992d42984d06

    SHA1

    439827777df4a337cbb9fa4a4640d0d3fa1738b7

    SHA256

    27ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6

    SHA512

    6b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c

  • memory/5032-0-0x0000000000400000-0x000000000154F000-memory.dmp

    Filesize

    17.3MB

  • memory/5032-2-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/5032-1-0x0000000000400000-0x000000000154F000-memory.dmp

    Filesize

    17.3MB

  • memory/5032-7-0x0000000000400000-0x000000000154F000-memory.dmp

    Filesize

    17.3MB

  • memory/5032-9-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB