Analysis
-
max time kernel
106s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2025, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe
Resource
win10v2004-20250207-en
General
-
Target
d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe
-
Size
4.0MB
-
MD5
6830a67f26a493032170a92a85cecd40
-
SHA1
5e39c0ed03aa07922d74fe2bf36aed4d4c9b5d54
-
SHA256
d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d
-
SHA512
4a02a6611ab6f4a5b5eb0ec0698fe2d3e8c54c4f119cf04499331fef5730d8a46a331add32710b156e8aaa36d2be74ba1a8ef47b3b7154e7b7a3dfac544d0d99
-
SSDEEP
49152:FvLURhh5foXXpiO/1xVW/oDEIfiCUqlgPcbDcP4E5PNUwIocWMn/ePFDN+6XaH:FvKCXXpi6DhHUCgqDIFPCw15MmPFDov
Malware Config
Signatures
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 43 4476 Process not Found 55 2600 BitLockerToGo.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 tvgSHvbTV0u.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5100 set thread context of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvgSHvbTV0u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2976 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 5100 wrote to memory of 2600 5100 d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe 94 PID 2600 wrote to memory of 2564 2600 BitLockerToGo.exe 109 PID 2600 wrote to memory of 2564 2600 BitLockerToGo.exe 109 PID 2600 wrote to memory of 2564 2600 BitLockerToGo.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe"C:\Users\Admin\AppData\Local\Temp\d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\ZuBDGrx7\tvgSHvbTV0u.exe"C:\Users\Admin\AppData\Roaming\ZuBDGrx7\tvgSHvbTV0u.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2564
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjU0MjQ5MTI4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5416cb9d6719ee2432f060c96bd1f9ce3
SHA1879e73fd3a5756c166913889fc0a11f9a5edf856
SHA256956750bf7ba2f6a82cc3ff89c0738c036c9f79e81232c364f16858345ef4123e
SHA51204b20f7863ae96c9143bb49d45f9727777546e4f42267c1815e72414b63437f128f64c5ea001157c8ac66b00d4770419f08cee09e13ecf5849865ef2f2003e90