Overview
overview
10Static
static
107zS850A099...ed.exe
windows7-x64
37zS850A099...ed.exe
windows10-2004-x64
77zS850A099...1a.exe
windows7-x64
77zS850A099...1a.exe
windows10-2004-x64
77zS850A099...b7.exe
windows7-x64
107zS850A099...b7.exe
windows10-2004-x64
107zS850A099...5e.exe
windows7-x64
67zS850A099...5e.exe
windows10-2004-x64
67zS850A099...a0.exe
windows7-x64
107zS850A099...a0.exe
windows10-2004-x64
107zS850A099...95.exe
windows7-x64
87zS850A099...95.exe
windows10-2004-x64
77zS850A099...cb.exe
windows7-x64
107zS850A099...cb.exe
windows10-2004-x64
107zS850A099...58.exe
windows7-x64
107zS850A099...58.exe
windows10-2004-x64
107zS850A099...7f.exe
windows7-x64
107zS850A099...7f.exe
windows10-2004-x64
107zS850A099...32.exe
windows7-x64
107zS850A099...32.exe
windows10-2004-x64
107zS850A099...c3.exe
windows7-x64
97zS850A099...c3.exe
windows10-2004-x64
97zS850A099...e9.exe
windows7-x64
107zS850A099...e9.exe
windows10-2004-x64
107zS850A099...8c.exe
windows7-x64
37zS850A099...8c.exe
windows10-2004-x64
37zS850A099...8c.exe
windows7-x64
67zS850A099...8c.exe
windows10-2004-x64
67zS850A099...rl.dll
windows7-x64
37zS850A099...rl.dll
windows10-2004-x64
37zS850A099...pp.dll
windows7-x64
37zS850A099...pp.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 06:29
Behavioral task
behavioral1
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS850A099E/libcurl.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
7zS850A099E/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS850A099E/libcurlpp.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
7zS850A099E/libcurlpp.dll
Resource
win10v2004-20241007-en
General
-
Target
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
-
Size
405KB
-
MD5
031f38d24ae18e9d3d3b878b9b1d8902
-
SHA1
b089e0f0d1809873b2d8d86e9c72f9136efa9983
-
SHA256
23facfbb54ebef4f301cd273be87ce89ae421f2cf2f79ebbc0e5338a54b4c356
-
SHA512
278dac8cbc45ad9e758da3f368e7f72e01b5e59d79c7176bfdf90a2bf1caf89f29c8852c66bff25c5ae8b4395724f54c8525e83881c1cd1f5b6ccd175852241d
-
SSDEEP
6144:V/Kw8p+TAL2ICoCn2A+OiSmLie6PgZzE7ITsq:VSHp+npoCn23/SmLDo8E7
Malware Config
Extracted
gcleaner
web-stat.biz
privatevolume.bi
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
Processes:
resource yara_rule behavioral15/memory/1796-1-0x00000000002F0000-0x000000000033C000-memory.dmp family_onlylogger behavioral15/memory/1796-2-0x0000000000400000-0x0000000000450000-memory.dmp family_onlylogger behavioral15/memory/1796-3-0x0000000000400000-0x000000000046C000-memory.dmp family_onlylogger behavioral15/memory/1796-5-0x00000000002F0000-0x000000000033C000-memory.dmp family_onlylogger behavioral15/memory/1796-6-0x0000000000400000-0x0000000000450000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2244 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
61e7501ab629f_Tue23c4645058.execmd.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e7501ab629f_Tue23c4645058.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2312 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2312 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
61e7501ab629f_Tue23c4645058.execmd.exedescription pid process target process PID 1796 wrote to memory of 2244 1796 61e7501ab629f_Tue23c4645058.exe cmd.exe PID 1796 wrote to memory of 2244 1796 61e7501ab629f_Tue23c4645058.exe cmd.exe PID 1796 wrote to memory of 2244 1796 61e7501ab629f_Tue23c4645058.exe cmd.exe PID 1796 wrote to memory of 2244 1796 61e7501ab629f_Tue23c4645058.exe cmd.exe PID 2244 wrote to memory of 2312 2244 cmd.exe taskkill.exe PID 2244 wrote to memory of 2312 2244 cmd.exe taskkill.exe PID 2244 wrote to memory of 2312 2244 cmd.exe taskkill.exe PID 2244 wrote to memory of 2312 2244 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "61e7501ab629f_Tue23c4645058.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "61e7501ab629f_Tue23c4645058.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-