Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2025, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250211-en
General
-
Target
random.exe
-
Size
4.0MB
-
MD5
6830a67f26a493032170a92a85cecd40
-
SHA1
5e39c0ed03aa07922d74fe2bf36aed4d4c9b5d54
-
SHA256
d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d
-
SHA512
4a02a6611ab6f4a5b5eb0ec0698fe2d3e8c54c4f119cf04499331fef5730d8a46a331add32710b156e8aaa36d2be74ba1a8ef47b3b7154e7b7a3dfac544d0d99
-
SSDEEP
49152:FvLURhh5foXXpiO/1xVW/oDEIfiCUqlgPcbDcP4E5PNUwIocWMn/ePFDN+6XaH:FvKCXXpi6DhHUCgqDIFPCw15MmPFDov
Malware Config
Signatures
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 41 3520 Process not Found -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Executes dropped EXE 2 IoCs
pid Process 1824 setup.exe 1512 setup.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\Software\Wine random.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 440 random.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 440 set thread context of 5116 440 random.exe 91 -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Temp\source1824_857128905\MSEDGE.7z setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\SETUP.EX_ MicrosoftEdge_X64_133.0.3065.59.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\setup.exe MicrosoftEdge_X64_133.0.3065.59.exe File opened for modification C:\Program Files\msedge_installer.log setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3764 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 440 random.exe 440 random.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1824 setup.exe Token: SeIncBasePriorityPrivilege 1824 setup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 440 wrote to memory of 5116 440 random.exe 91 PID 4884 wrote to memory of 1824 4884 MicrosoftEdge_X64_133.0.3065.59.exe 103 PID 4884 wrote to memory of 1824 4884 MicrosoftEdge_X64_133.0.3065.59.exe 103 PID 1824 wrote to memory of 1512 1824 setup.exe 104 PID 1824 wrote to memory of 1512 1824 setup.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDAxNTU2MTk1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3764
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\MicrosoftEdge_X64_133.0.3065.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff66f2d6a68,0x7ff66f2d6a74,0x7ff66f2d6a803⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1E3CFEF1-CB2B-4B0A-BF47-0329FE8CB6E5}\EDGEMITMP_674D8.tmp\setup.exe
Filesize6.8MB
MD51b3e9c59f9c7a134ec630ada1eb76a39
SHA1a7e831d392e99f3d37847dcc561dd2e017065439
SHA256ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae
SHA512c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e