Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2025, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250207-en
General
-
Target
random.exe
-
Size
4.0MB
-
MD5
6830a67f26a493032170a92a85cecd40
-
SHA1
5e39c0ed03aa07922d74fe2bf36aed4d4c9b5d54
-
SHA256
d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d
-
SHA512
4a02a6611ab6f4a5b5eb0ec0698fe2d3e8c54c4f119cf04499331fef5730d8a46a331add32710b156e8aaa36d2be74ba1a8ef47b3b7154e7b7a3dfac544d0d99
-
SSDEEP
49152:FvLURhh5foXXpiO/1xVW/oDEIfiCUqlgPcbDcP4E5PNUwIocWMn/ePFDN+6XaH:FvKCXXpi6DhHUCgqDIFPCw15MmPFDov
Malware Config
Signatures
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 66 4920 Process not Found 41 2584 Process not Found 64 2148 BitLockerToGo.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Executes dropped EXE 1 IoCs
pid Process 3324 vjtPYUZScfq6.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Software\Wine random.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4132 random.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4132 set thread context of 2148 4132 random.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjtPYUZScfq6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 632 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4132 random.exe 4132 random.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 4132 wrote to memory of 2148 4132 random.exe 89 PID 2148 wrote to memory of 3324 2148 BitLockerToGo.exe 96 PID 2148 wrote to memory of 3324 2148 BitLockerToGo.exe 96 PID 2148 wrote to memory of 3324 2148 BitLockerToGo.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\7OAtXwDSO9Y\vjtPYUZScfq6.exe"C:\Users\Admin\AppData\Roaming\7OAtXwDSO9Y\vjtPYUZScfq6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3324
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzkwOTk5NDQ1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD5bc30e6149ab596ace1109831ba79450a
SHA191ca0272f70f252d7e1947ad8ad02646dc29013e
SHA256adf58ee530efcbd5d0dac7c2d28c1caaf2122d79e3bf03c9dba0ed7a6d96bbb8
SHA5129f938ffb79ce9512bdd0f192569485924c56092c9d7d621fed66e54a892e281a05c263b09390e43f0abb6627183fbef12bb62e816a982c86e469c801b311b34f