Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe
Resource
win7-20240903-en
General
-
Target
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe
-
Size
3.3MB
-
MD5
cf3090e3b1ef89b074a1abc416b264f0
-
SHA1
c15b5c72185c43d1e3aa4e3727e579fccfba1906
-
SHA256
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c
-
SHA512
40bde43cef15b70df1c9e194df25b91abfa9d4b5c7bdb0d25b757404725f0ef0f705b985dde78522fc2bfb0bd1e419dc339a76c201ccafb3d48c02a00b606c2f
-
SSDEEP
98304:m0tFNMxDHrKZ6Qu9Pw98m887AbCs7CWjRs90:m0tFNMxDLKZx0
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ymIv7VdUSn.exepid process 2292 ymIv7VdUSn.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exeymIv7VdUSn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymIv7VdUSn.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exepid process 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exepid process 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exedescription pid process target process PID 5032 wrote to memory of 2292 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe ymIv7VdUSn.exe PID 5032 wrote to memory of 2292 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe ymIv7VdUSn.exe PID 5032 wrote to memory of 2292 5032 3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe ymIv7VdUSn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe"C:\Users\Admin\AppData\Local\Temp\3e0cc394d2ecaea0002e3303beb4465604a7d44670cd5752d44d107ca733bc2c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\{8b5c0330-510d-11ef-ac57-806e6f6e6963}\ymIv7VdUSn.exe
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c