Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/02/2025, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250211-en
General
-
Target
random.exe
-
Size
4.0MB
-
MD5
6830a67f26a493032170a92a85cecd40
-
SHA1
5e39c0ed03aa07922d74fe2bf36aed4d4c9b5d54
-
SHA256
d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d
-
SHA512
4a02a6611ab6f4a5b5eb0ec0698fe2d3e8c54c4f119cf04499331fef5730d8a46a331add32710b156e8aaa36d2be74ba1a8ef47b3b7154e7b7a3dfac544d0d99
-
SSDEEP
49152:FvLURhh5foXXpiO/1xVW/oDEIfiCUqlgPcbDcP4E5PNUwIocWMn/ePFDN+6XaH:FvKCXXpi6DhHUCgqDIFPCw15MmPFDov
Malware Config
Signatures
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 6 2596 BitLockerToGo.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Executes dropped EXE 1 IoCs
pid Process 444 N5Mg3bg1LDTH.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine random.exe -
Loads dropped DLL 1 IoCs
pid Process 2596 BitLockerToGo.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2704 random.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 2596 2704 random.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N5Mg3bg1LDTH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 random.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2704 wrote to memory of 2596 2704 random.exe 30 PID 2596 wrote to memory of 444 2596 BitLockerToGo.exe 33 PID 2596 wrote to memory of 444 2596 BitLockerToGo.exe 33 PID 2596 wrote to memory of 444 2596 BitLockerToGo.exe 33 PID 2596 wrote to memory of 444 2596 BitLockerToGo.exe 33 PID 2596 wrote to memory of 444 2596 BitLockerToGo.exe 33 PID 2596 wrote to memory of 444 2596 BitLockerToGo.exe 33 PID 2596 wrote to memory of 444 2596 BitLockerToGo.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\Ox6NR\N5Mg3bg1LDTH.exe"C:\Users\Admin\AppData\Roaming\Ox6NR\N5Mg3bg1LDTH.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5b4e73e595d16f0f8d92f227b770d478a
SHA159f506b90a3aacfde075e32462c7db6751df15d5
SHA256967c6eeb834fbbd6ba93b5a0c998a5c55c595f58fe36e1ae8a6de2c3ec735716
SHA5127aaa2b3d6ce26e4f2c331b4aafb472dcd339f81ddee4dab5dcddcd926c7bc87a06fed77adc18d6c69d35a384efac51c174d20d9731cedd78aa3dfc000cce2efd