Overview
overview
10Static
static
107zS8B74BEB...17.exe
windows7-x64
67zS8B74BEB...17.exe
windows10-2004-x64
67zS8B74BEB...fb.exe
windows7-x64
37zS8B74BEB...fb.exe
windows10-2004-x64
37zS8B74BEB...51.exe
windows7-x64
37zS8B74BEB...51.exe
windows10-2004-x64
77zS8B74BEB...6c.exe
windows7-x64
77zS8B74BEB...6c.exe
windows10-2004-x64
77zS8B74BEB...79.exe
windows7-x64
107zS8B74BEB...79.exe
windows10-2004-x64
107zS8B74BEB...f2.exe
windows7-x64
77zS8B74BEB...f2.exe
windows10-2004-x64
77zS8B74BEB...21.exe
windows7-x64
107zS8B74BEB...21.exe
windows10-2004-x64
107zS8B74BEB...ed.exe
windows7-x64
107zS8B74BEB...ed.exe
windows10-2004-x64
107zS8B74BEB...2a.exe
windows7-x64
107zS8B74BEB...2a.exe
windows10-2004-x64
107zS8B74BEB...6f.exe
windows7-x64
77zS8B74BEB...6f.exe
windows10-2004-x64
77zS8B74BEB...bd.exe
windows7-x64
77zS8B74BEB...bd.exe
windows10-2004-x64
77zS8B74BEB...93.exe
windows7-x64
107zS8B74BEB...93.exe
windows10-2004-x64
107zS8B74BEB...rl.dll
windows7-x64
37zS8B74BEB...rl.dll
windows10-2004-x64
37zS8B74BEB...pp.dll
windows7-x64
37zS8B74BEB...pp.dll
windows10-2004-x64
37zS8B74BEB...-1.dll
windows7-x64
37zS8B74BEB...-1.dll
windows10-2004-x64
37zS8B74BEB...-6.dll
windows7-x64
37zS8B74BEB...-6.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 22:06
Behavioral task
behavioral1
Sample
7zS8B74BEBB/623f4ec66a5ad_Sat1734f544217.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zS8B74BEBB/623f4ec66a5ad_Sat1734f544217.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS8B74BEBB/623f4ec77fd3f_Sat1772aefb.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
7zS8B74BEBB/623f4ec77fd3f_Sat1772aefb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS8B74BEBB/623f4ec86395b_Sat173c84b551.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
7zS8B74BEBB/623f4ec86395b_Sat173c84b551.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS8B74BEBB/623f4eca3de95_Sat17334d36c.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zS8B74BEBB/623f4eca3de95_Sat17334d36c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS8B74BEBB/623f4ecc3aad7_Sat17f86f68979.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7zS8B74BEBB/623f4ecc3aad7_Sat17f86f68979.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS8B74BEBB/623f4ecdc319c_Sat17f45527bef2.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
7zS8B74BEBB/623f4ecdc319c_Sat17f45527bef2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS8B74BEBB/623f4ee614d64_Sat17bf153ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zS8B74BEBB/623f4ee614d64_Sat17bf153ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS8B74BEBB/623f4ee7540ef_Sat1772b105d2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
7zS8B74BEBB/623f4ee7540ef_Sat1772b105d2a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS8B74BEBB/623f4ee864d35_Sat17400b6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7zS8B74BEBB/623f4ee864d35_Sat17400b6f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS8B74BEBB/623f4ee97f2a0_Sat170aca8c6fbd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zS8B74BEBB/623f4ee97f2a0_Sat170aca8c6fbd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS8B74BEBB/623f4eeb25e05_Sat1728a2b93.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7zS8B74BEBB/623f4eeb25e05_Sat1728a2b93.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS8B74BEBB/libcurl.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
7zS8B74BEBB/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS8B74BEBB/libcurlpp.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7zS8B74BEBB/libcurlpp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS8B74BEBB/libgcc_s_dw2-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7zS8B74BEBB/libgcc_s_dw2-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS8B74BEBB/libstdc++-6.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
7zS8B74BEBB/libstdc++-6.dll
Resource
win10v2004-20241007-en
General
-
Target
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
-
Size
372KB
-
MD5
ba0bb9efa33cf4eb238cec78dc15172b
-
SHA1
0f49a73c90f4f00428ae9f41c3cc8d8bb3544209
-
SHA256
65bf24adac4f57d046f62c773ece38cdd1ac6fe98959daa513acaca060be89f5
-
SHA512
2326a681fb14a906bb22b0f6e7646f969b8a0d666c93e6f42c836ac3e40cb082f5f2aa2ea03f7640613329c1959c42528a8c6fdaddbe6c47447bf701fc42607a
-
SSDEEP
3072:tXKyEogBJsRga8fdpD4r2eqX0M897Tqcm77A9pAYzBwtz/Dlq84rN27H/C9Mf5sN:tgJemFdpD42X0M89xAKBIrDikTc
Malware Config
Extracted
gcleaner
appwebstat.biz
ads-memory.biz
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral13/memory/2476-2-0x0000000000220000-0x0000000000271000-memory.dmp family_onlylogger behavioral13/memory/2476-3-0x0000000000400000-0x0000000000455000-memory.dmp family_onlylogger behavioral13/memory/2476-4-0x0000000000400000-0x00000000004A0000-memory.dmp family_onlylogger behavioral13/memory/2476-6-0x0000000000400000-0x0000000000455000-memory.dmp family_onlylogger behavioral13/memory/2476-5-0x0000000000220000-0x0000000000271000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
pid Process 2024 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623f4ee48c005_Sat17a6fc071121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2340 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2024 2476 623f4ee48c005_Sat17a6fc071121.exe 30 PID 2476 wrote to memory of 2024 2476 623f4ee48c005_Sat17a6fc071121.exe 30 PID 2476 wrote to memory of 2024 2476 623f4ee48c005_Sat17a6fc071121.exe 30 PID 2476 wrote to memory of 2024 2476 623f4ee48c005_Sat17a6fc071121.exe 30 PID 2024 wrote to memory of 2340 2024 cmd.exe 32 PID 2024 wrote to memory of 2340 2024 cmd.exe 32 PID 2024 wrote to memory of 2340 2024 cmd.exe 32 PID 2024 wrote to memory of 2340 2024 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4ee48c005_Sat17a6fc071121.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4ee48c005_Sat17a6fc071121.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "623f4ee48c005_Sat17a6fc071121.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4ee48c005_Sat17a6fc071121.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "623f4ee48c005_Sat17a6fc071121.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-