Overview
overview
10Static
static
107zS8B74BEB...17.exe
windows7-x64
67zS8B74BEB...17.exe
windows10-2004-x64
67zS8B74BEB...fb.exe
windows7-x64
37zS8B74BEB...fb.exe
windows10-2004-x64
37zS8B74BEB...51.exe
windows7-x64
37zS8B74BEB...51.exe
windows10-2004-x64
77zS8B74BEB...6c.exe
windows7-x64
77zS8B74BEB...6c.exe
windows10-2004-x64
77zS8B74BEB...79.exe
windows7-x64
107zS8B74BEB...79.exe
windows10-2004-x64
107zS8B74BEB...f2.exe
windows7-x64
77zS8B74BEB...f2.exe
windows10-2004-x64
77zS8B74BEB...21.exe
windows7-x64
107zS8B74BEB...21.exe
windows10-2004-x64
107zS8B74BEB...ed.exe
windows7-x64
107zS8B74BEB...ed.exe
windows10-2004-x64
107zS8B74BEB...2a.exe
windows7-x64
107zS8B74BEB...2a.exe
windows10-2004-x64
107zS8B74BEB...6f.exe
windows7-x64
77zS8B74BEB...6f.exe
windows10-2004-x64
77zS8B74BEB...bd.exe
windows7-x64
77zS8B74BEB...bd.exe
windows10-2004-x64
77zS8B74BEB...93.exe
windows7-x64
107zS8B74BEB...93.exe
windows10-2004-x64
107zS8B74BEB...rl.dll
windows7-x64
37zS8B74BEB...rl.dll
windows10-2004-x64
37zS8B74BEB...pp.dll
windows7-x64
37zS8B74BEB...pp.dll
windows10-2004-x64
37zS8B74BEB...-1.dll
windows7-x64
37zS8B74BEB...-1.dll
windows10-2004-x64
37zS8B74BEB...-6.dll
windows7-x64
37zS8B74BEB...-6.dll
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 22:06
Behavioral task
behavioral1
Sample
7zS8B74BEBB/623f4ec66a5ad_Sat1734f544217.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zS8B74BEBB/623f4ec66a5ad_Sat1734f544217.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS8B74BEBB/623f4ec77fd3f_Sat1772aefb.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
7zS8B74BEBB/623f4ec77fd3f_Sat1772aefb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS8B74BEBB/623f4ec86395b_Sat173c84b551.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
7zS8B74BEBB/623f4ec86395b_Sat173c84b551.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS8B74BEBB/623f4eca3de95_Sat17334d36c.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zS8B74BEBB/623f4eca3de95_Sat17334d36c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS8B74BEBB/623f4ecc3aad7_Sat17f86f68979.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7zS8B74BEBB/623f4ecc3aad7_Sat17f86f68979.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS8B74BEBB/623f4ecdc319c_Sat17f45527bef2.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
7zS8B74BEBB/623f4ecdc319c_Sat17f45527bef2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS8B74BEBB/623f4ee614d64_Sat17bf153ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zS8B74BEBB/623f4ee614d64_Sat17bf153ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS8B74BEBB/623f4ee7540ef_Sat1772b105d2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
7zS8B74BEBB/623f4ee7540ef_Sat1772b105d2a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS8B74BEBB/623f4ee864d35_Sat17400b6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7zS8B74BEBB/623f4ee864d35_Sat17400b6f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS8B74BEBB/623f4ee97f2a0_Sat170aca8c6fbd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zS8B74BEBB/623f4ee97f2a0_Sat170aca8c6fbd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS8B74BEBB/623f4eeb25e05_Sat1728a2b93.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7zS8B74BEBB/623f4eeb25e05_Sat1728a2b93.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS8B74BEBB/libcurl.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
7zS8B74BEBB/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS8B74BEBB/libcurlpp.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7zS8B74BEBB/libcurlpp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS8B74BEBB/libgcc_s_dw2-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7zS8B74BEBB/libgcc_s_dw2-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS8B74BEBB/libstdc++-6.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
7zS8B74BEBB/libstdc++-6.dll
Resource
win10v2004-20241007-en
General
-
Target
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
-
Size
372KB
-
MD5
ba0bb9efa33cf4eb238cec78dc15172b
-
SHA1
0f49a73c90f4f00428ae9f41c3cc8d8bb3544209
-
SHA256
65bf24adac4f57d046f62c773ece38cdd1ac6fe98959daa513acaca060be89f5
-
SHA512
2326a681fb14a906bb22b0f6e7646f969b8a0d666c93e6f42c836ac3e40cb082f5f2aa2ea03f7640613329c1959c42528a8c6fdaddbe6c47447bf701fc42607a
-
SSDEEP
3072:tXKyEogBJsRga8fdpD4r2eqX0M897Tqcm77A9pAYzBwtz/Dlq84rN27H/C9Mf5sN:tgJemFdpD42X0M89xAKBIrDikTc
Malware Config
Extracted
gcleaner
appwebstat.biz
ads-memory.biz
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral14/memory/1972-2-0x0000000000A80000-0x0000000000AD1000-memory.dmp family_onlylogger behavioral14/memory/1972-3-0x0000000000400000-0x0000000000455000-memory.dmp family_onlylogger behavioral14/memory/1972-4-0x0000000000400000-0x00000000004A0000-memory.dmp family_onlylogger behavioral14/memory/1972-6-0x0000000000400000-0x0000000000455000-memory.dmp family_onlylogger behavioral14/memory/1972-5-0x0000000000A80000-0x0000000000AD1000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 623f4ee48c005_Sat17a6fc071121.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 3764 1972 WerFault.exe 82 2608 1972 WerFault.exe 82 1968 1972 WerFault.exe 82 2596 1972 WerFault.exe 82 3228 1972 WerFault.exe 82 636 1972 WerFault.exe 82 2944 1972 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623f4ee48c005_Sat17a6fc071121.exe -
Kills process with taskkill 1 IoCs
pid Process 4616 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4616 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 4860 1972 623f4ee48c005_Sat17a6fc071121.exe 96 PID 1972 wrote to memory of 4860 1972 623f4ee48c005_Sat17a6fc071121.exe 96 PID 1972 wrote to memory of 4860 1972 623f4ee48c005_Sat17a6fc071121.exe 96 PID 4860 wrote to memory of 4616 4860 cmd.exe 100 PID 4860 wrote to memory of 4616 4860 cmd.exe 100 PID 4860 wrote to memory of 4616 4860 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4ee48c005_Sat17a6fc071121.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4ee48c005_Sat17a6fc071121.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 7002⤵
- Program crash
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 7842⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 9402⤵
- Program crash
PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 7242⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 7242⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 9842⤵
- Program crash
PID:636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "623f4ee48c005_Sat17a6fc071121.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4ee48c005_Sat17a6fc071121.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "623f4ee48c005_Sat17a6fc071121.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 10922⤵
- Program crash
PID:2944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1972 -ip 19721⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1972 -ip 19721⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1972 -ip 19721⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1972 -ip 19721⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1972 -ip 19721⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1972 -ip 19721⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1972 -ip 19721⤵PID:2080