Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe
Resource
win7-20240903-en
General
-
Target
175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe
-
Size
1.2MB
-
MD5
5e7ddeea0fe1a35171d3fd5f20be44b2
-
SHA1
815909a17584b54daf22e8180da126dad145f003
-
SHA256
175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27
-
SHA512
6825218feb64830a66b5e6211fe5a372b2bc2da7625f43647b8037f082adb62110ef671e186cd0c1be3b993a1072439319d23a70b4683ea3a85ca90ba67b2d5c
-
SSDEEP
24576:ypni2fBswduqbfaK3jnqPhoRiWkClW1mTy+dGMH43ybCYvWT4kq0E2Itf9fNXp:wiKswUqr37QhoRZpTyV6IyGYO8Tntf9X
Malware Config
Extracted
gcleaner
85.31.45.39
85.31.45.250
85.31.45.251
85.31.45.88
-
url_path
/b.php
/d.php
/d.php
Signatures
-
Gcleaner family
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4148 is-A2RVQ.tmp 4120 ckmeil525.exe -
Loads dropped DLL 3 IoCs
pid Process 4148 is-A2RVQ.tmp 4148 is-A2RVQ.tmp 4148 is-A2RVQ.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\CLmeil\ckmeil525.exe is-A2RVQ.tmp File created C:\Program Files (x86)\CLmeil\is-5LN7U.tmp is-A2RVQ.tmp File created C:\Program Files (x86)\CLmeil\is-3Q3AN.tmp is-A2RVQ.tmp File created C:\Program Files (x86)\CLmeil\is-U9RI0.tmp is-A2RVQ.tmp File opened for modification C:\Program Files (x86)\CLmeil\zmeil.url is-A2RVQ.tmp File opened for modification C:\Program Files (x86)\Common Files\Outlook Security Manager\secman.dll.log is-A2RVQ.tmp File opened for modification C:\Program Files (x86)\CLmeil\unins000.dat is-A2RVQ.tmp File created C:\Program Files (x86)\CLmeil\unins000.dat is-A2RVQ.tmp File created C:\Program Files (x86)\CLmeil\is-9C1JD.tmp is-A2RVQ.tmp File created C:\Program Files (x86)\CLmeil\is-5T73T.tmp is-A2RVQ.tmp File created C:\Program Files (x86)\Common Files\Outlook Security Manager\is-02KGO.tmp is-A2RVQ.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckmeil525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-A2RVQ.tmp -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\0\win32\ = "C:\\Program Files (x86)\\Common Files\\Outlook Security Manager\\secman.dll" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\InProcServer32 is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\ProgID is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\ProgID\ = "secman.OutlookSecurityManager.1" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\InprocServer32\ThreadingModel = "Apartment" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ProxyStubClsid32\ = "{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager.1 is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CLSID is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\FLAGS\ = "0" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32 is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib\Version = "1.0" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\InprocServer32 is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Outlook Security Manager\\secman.dll" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\ = "OutlookSecurityManager Class" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\0\win32 is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\secman.DLL is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager.1\CLSID\ = "{826D7151-8D99-434B-8540-082B8C2AE556}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CurVer\ = "secman.OutlookSecurityManager.1" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\Programmable is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib\Version = "1.0" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ = "IOutlookSecurityManager" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32 is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\NumMethods\ = "12" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CurVer is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager\CLSID\ = "{826D7151-8D99-434B-8540-082B8C2AE556}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\AppID = "{4D076AB4-7562-427A-B5D2-BD96E19DEE56}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib\ = "{11549FE4-7C5A-4C17-9FC3-56FC5162A994}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ = "IOutlookSecurityManager2" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ = "PSFactoryBuffer" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56}\ = "secman" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager.1\CLSID is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\NumMethods is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\TypeLib\ = "{11549FE4-7C5A-4C17-9FC3-56FC5162A994}" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\NumMethods is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\FLAGS is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Common Files\\Outlook Security Manager\\" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\InProcServer32\ThreadingModel = "Both" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32\ = "{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\VersionIndependentProgID\ = "secman.OutlookSecurityManager" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0 is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ = "IOutlookSecurityManager" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\secman.DLL\AppID = "{4D076AB4-7562-427A-B5D2-BD96E19DEE56}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\secman.OutlookSecurityManager.1\ = "OutlookSecurityManager Class" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib\ = "{11549FE4-7C5A-4C17-9FC3-56FC5162A994}" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib\Version = "1.0" is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ = "IOutlookSecurityManager2" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\HELPDIR is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994} is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\TypeLib is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ProxyStubClsid32 is-A2RVQ.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\TypeLib\ = "{11549FE4-7C5A-4C17-9FC3-56FC5162A994}" is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556} is-A2RVQ.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\VersionIndependentProgID is-A2RVQ.tmp -
Runs net.exe
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3368 wrote to memory of 4148 3368 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe 83 PID 3368 wrote to memory of 4148 3368 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe 83 PID 3368 wrote to memory of 4148 3368 175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe 83 PID 4148 wrote to memory of 4392 4148 is-A2RVQ.tmp 84 PID 4148 wrote to memory of 4392 4148 is-A2RVQ.tmp 84 PID 4148 wrote to memory of 4392 4148 is-A2RVQ.tmp 84 PID 4148 wrote to memory of 4120 4148 is-A2RVQ.tmp 85 PID 4148 wrote to memory of 4120 4148 is-A2RVQ.tmp 85 PID 4148 wrote to memory of 4120 4148 is-A2RVQ.tmp 85 PID 4392 wrote to memory of 1204 4392 net.exe 87 PID 4392 wrote to memory of 1204 4392 net.exe 87 PID 4392 wrote to memory of 1204 4392 net.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe"C:\Users\Admin\AppData\Local\Temp\175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\is-ADQ14.tmp\is-A2RVQ.tmp"C:\Users\Admin\AppData\Local\Temp\is-ADQ14.tmp\is-A2RVQ.tmp" /SL4 $D003E "C:\Users\Admin\AppData\Local\Temp\175fbd495e1e67dc9e90b8e9b1f77ca5d89adbde3bf3ffae9bd5ecbe53750e27.exe" 970734 844802⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 313⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 314⤵
- System Location Discovery: System Language Discovery
PID:1204
-
-
-
C:\Program Files (x86)\CLmeil\ckmeil525.exe"C:\Program Files (x86)\CLmeil\ckmeil525.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD50fb884732a9352f9e999b9467d34443d
SHA11a4ca64b9ec479dc92f6f2621a3c9fb971c9a1bf
SHA256d26abdc0730520eed70527225776aff8b03c6af1cf87f7045a5110fbf7abbef5
SHA5129119fd58ba93cd49e6877fb901d6a44589471aa911c02559bf0805626c6c8e408771d89bb81ad8d691c315bc1868bf6dc25bb9bbe1be160313637d00567ccfb9
-
Filesize
137KB
MD5ccad5c9028897be6f9ea4506772232fb
SHA120b74651813d446f98ac839dbbfc941707f3951d
SHA2567c35caf0274232e4fbe501df3a24cb282bfe7c3d052bc50a388fd9a59de7b494
SHA51250df823a32103e369320b66d746a0592a208fcf3cb2f90f874afb6b5ca9e1e515139f65f7477e5a322ade51683f778b6eea65af2250fd8ddd29f67fd60a5a8ca
-
Filesize
676KB
MD5d96f2e5b808c06c617d6d0be160b76f9
SHA11ae85eccf0834ee53b4a7fd44e06ec666caea838
SHA256e8acb5a41fcb5eb6f87c4f253bfa66c85bf6796e5ae8e86083b2ab3adf7b5f5e
SHA512b9dc562c2580ca857a93f514894b10dc5c7c076abc43b7567448ef0a86fea1af92b481d5d85a46c1bc0789f0e82d688a43ffcff73160ae571ea82a3b8496b1ab
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63