Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe
Resource
win7-20240708-en
General
-
Target
175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe
-
Size
1.2MB
-
MD5
5e7ddeea0fe1a35171d3fd5f20be44b2
-
SHA1
815909a17584b54daf22e8180da126dad145f003
-
SHA256
175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27
-
SHA512
6825218feb64830a66b5e6211fe5a372b2bc2da7625f43647b8037f082adb62110ef671e186cd0c1be3b993a1072439319d23a70b4683ea3a85ca90ba67b2d5c
-
SSDEEP
24576:ypni2fBswduqbfaK3jnqPhoRiWkClW1mTy+dGMH43ybCYvWT4kq0E2Itf9fNXp:wiKswUqr37QhoRZpTyV6IyGYO8Tntf9X
Malware Config
Extracted
gcleaner
85.31.45.39
85.31.45.250
85.31.45.251
85.31.45.88
-
url_path
/b.php
/d.php
/d.php
Signatures
-
Gcleaner family
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2444 is-KO7V3.tmp 4596 ckmeil525.exe -
Loads dropped DLL 3 IoCs
pid Process 2444 is-KO7V3.tmp 2444 is-KO7V3.tmp 2444 is-KO7V3.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\CLmeil\zmeil.url is-KO7V3.tmp File opened for modification C:\Program Files (x86)\CLmeil\unins000.dat is-KO7V3.tmp File created C:\Program Files (x86)\CLmeil\unins000.dat is-KO7V3.tmp File created C:\Program Files (x86)\CLmeil\is-293BR.tmp is-KO7V3.tmp File created C:\Program Files (x86)\CLmeil\is-R9BQ0.tmp is-KO7V3.tmp File created C:\Program Files (x86)\CLmeil\is-Q6DQO.tmp is-KO7V3.tmp File created C:\Program Files (x86)\Common Files\Outlook Security Manager\is-N64DL.tmp is-KO7V3.tmp File created C:\Program Files (x86)\CLmeil\is-RSCC5.tmp is-KO7V3.tmp File created C:\Program Files (x86)\CLmeil\is-NTCSD.tmp is-KO7V3.tmp File opened for modification C:\Program Files (x86)\Common Files\Outlook Security Manager\secman.dll.log is-KO7V3.tmp File opened for modification C:\Program Files (x86)\CLmeil\ckmeil525.exe is-KO7V3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-KO7V3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckmeil525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\VersionIndependentProgID\ = "secman.OutlookSecurityManager" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32 is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib\ = "{11549FE4-7C5A-4C17-9FC3-56FC5162A994}" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\secman.DLL\AppID = "{4D076AB4-7562-427A-B5D2-BD96E19DEE56}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\ = "secman 1.0 Type Library" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\HELPDIR is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ = "IOutlookSecurityManager2" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib\ = "{11549FE4-7C5A-4C17-9FC3-56FC5162A994}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\InProcServer32\ThreadingModel = "Both" is-KO7V3.tmp Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\WOW6432Node\Interface is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CLSID is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\NumMethods is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\ = "OutlookSecurityManager Class" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\TypeLib is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib\ = "{11549FE4-7C5A-4C17-9FC3-56FC5162A994}" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\secman.DLL is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CurVer is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\Programmable is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib\Version = "1.0" is-KO7V3.tmp Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\WOW6432Node\CLSID is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\NumMethods is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CLSID\ = "{826D7151-8D99-434B-8540-082B8C2AE556}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\ProgID\ = "secman.OutlookSecurityManager.1" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\VersionIndependentProgID is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\InprocServer32 is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CurVer\ = "secman.OutlookSecurityManager.1" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ = "IOutlookSecurityManager" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib\Version = "1.0" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\InProcServer32\ = "C:\\Program Files (x86)\\Common Files\\Outlook Security Manager\\secman.dll" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\InprocServer32\ThreadingModel = "Apartment" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32 is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ = "PSFactoryBuffer" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32\ = "{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\FLAGS\ = "0" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE} is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\0\win32\ = "C:\\Program Files (x86)\\Common Files\\Outlook Security Manager\\secman.dll" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib\Version = "1.0" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ProxyStubClsid32\ = "{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager.1\ = "OutlookSecurityManager Class" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Outlook Security Manager\\secman.dll" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ProxyStubClsid32 is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\NumMethods\ = "12" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\ = "OutlookSecurityManager Class" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager.1 is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\FLAGS is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56}\ = "secman" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\AppID = "{4D076AB4-7562-427A-B5D2-BD96E19DEE56}" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\0\win32 is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ = "IOutlookSecurityManager" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\InProcServer32 is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager.1\CLSID\ = "{826D7151-8D99-434B-8540-082B8C2AE556}" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994} is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" is-KO7V3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib\Version = "1.0" is-KO7V3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE} is-KO7V3.tmp -
Runs net.exe
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2444 4676 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe 82 PID 4676 wrote to memory of 2444 4676 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe 82 PID 4676 wrote to memory of 2444 4676 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe 82 PID 2444 wrote to memory of 60 2444 is-KO7V3.tmp 83 PID 2444 wrote to memory of 60 2444 is-KO7V3.tmp 83 PID 2444 wrote to memory of 60 2444 is-KO7V3.tmp 83 PID 2444 wrote to memory of 4596 2444 is-KO7V3.tmp 84 PID 2444 wrote to memory of 4596 2444 is-KO7V3.tmp 84 PID 2444 wrote to memory of 4596 2444 is-KO7V3.tmp 84 PID 60 wrote to memory of 4212 60 net.exe 86 PID 60 wrote to memory of 4212 60 net.exe 86 PID 60 wrote to memory of 4212 60 net.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe"C:\Users\Admin\AppData\Local\Temp\175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\is-SB2TE.tmp\is-KO7V3.tmp"C:\Users\Admin\AppData\Local\Temp\is-SB2TE.tmp\is-KO7V3.tmp" /SL4 $A0046 "C:\Users\Admin\AppData\Local\Temp\175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe" 970734 844802⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 313⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 314⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
-
C:\Program Files (x86)\CLmeil\ckmeil525.exe"C:\Program Files (x86)\CLmeil\ckmeil525.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD50fb884732a9352f9e999b9467d34443d
SHA11a4ca64b9ec479dc92f6f2621a3c9fb971c9a1bf
SHA256d26abdc0730520eed70527225776aff8b03c6af1cf87f7045a5110fbf7abbef5
SHA5129119fd58ba93cd49e6877fb901d6a44589471aa911c02559bf0805626c6c8e408771d89bb81ad8d691c315bc1868bf6dc25bb9bbe1be160313637d00567ccfb9
-
Filesize
137KB
MD5ccad5c9028897be6f9ea4506772232fb
SHA120b74651813d446f98ac839dbbfc941707f3951d
SHA2567c35caf0274232e4fbe501df3a24cb282bfe7c3d052bc50a388fd9a59de7b494
SHA51250df823a32103e369320b66d746a0592a208fcf3cb2f90f874afb6b5ca9e1e515139f65f7477e5a322ade51683f778b6eea65af2250fd8ddd29f67fd60a5a8ca
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
676KB
MD5d96f2e5b808c06c617d6d0be160b76f9
SHA11ae85eccf0834ee53b4a7fd44e06ec666caea838
SHA256e8acb5a41fcb5eb6f87c4f253bfa66c85bf6796e5ae8e86083b2ab3adf7b5f5e
SHA512b9dc562c2580ca857a93f514894b10dc5c7c076abc43b7567448ef0a86fea1af92b481d5d85a46c1bc0789f0e82d688a43ffcff73160ae571ea82a3b8496b1ab