Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2025, 06:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
728cffa0a14b4eee01867884a899dc2c.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
728cffa0a14b4eee01867884a899dc2c.exe
-
Size
5.0MB
-
MD5
728cffa0a14b4eee01867884a899dc2c
-
SHA1
167eb9d72caecf5145185e5eec4b01ffe14c1e05
-
SHA256
cf8b362bc545c356a2cd44e406442446d796a8ed8f245cb1eb4568c9f9516d0c
-
SHA512
571b0501b2bb32fee7f7dbeccd218030f5529546141595607ac9b4c5864289f65f5367a884899cc3dcf043132c3ed5a027614a2cb26c05242a23fcd201d81ddc
-
SSDEEP
49152:cWLatBqcE4ft02kePb1OJqNR5n781la5W6tI9aVtdRKHNrZDqtEVSZ2gw76x1Kja:FaqcE42Sb1OJq778p6tKvVSq9
Malware Config
Extracted
Family
gcleaner
C2
185.156.73.73
Signatures
-
Gcleaner family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3080 set thread context of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 728cffa0a14b4eee01867884a899dc2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84 PID 3080 wrote to memory of 4256 3080 728cffa0a14b4eee01867884a899dc2c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\728cffa0a14b4eee01867884a899dc2c.exe"C:\Users\Admin\AppData\Local\Temp\728cffa0a14b4eee01867884a899dc2c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exenone2⤵
- System Location Discovery: System Language Discovery
PID:4256
-