Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2025, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
c6e0798bf3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c6e0798bf3.exe
Resource
win10v2004-20250217-en
General
-
Target
c6e0798bf3.exe
-
Size
3.7MB
-
MD5
467266ba67d21e7180338773c0529039
-
SHA1
6d9c86ac604e3b3a2bdf86fdc106eda4226c3a1a
-
SHA256
4c9e514da670422e773cac781d66a4207a31d78e7a21d30a0536bfff27a739c6
-
SHA512
94e2f33f7198bb7d19ec87af7749957c563b8f7c9d8c11e10c4e66c1023f00ea526c7eb336ce21f1ad4d7c6c00f00ced32b90a3e0df8db5b3d1e45b13a7e3cea
-
SSDEEP
98304:pXaGesQTmvWQrS1n8qkk4WbFTFLH8AbRakvyz0bLooZh20F:1ATmOQrSC/0FTFDNxK0PoovB
Malware Config
Extracted
gcleaner
185.156.73.73
Signatures
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6e0798bf3.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 10 888 BitLockerToGo.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6e0798bf3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6e0798bf3.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine c6e0798bf3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5072 c6e0798bf3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5072 set thread context of 888 5072 c6e0798bf3.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6e0798bf3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5072 c6e0798bf3.exe 5072 c6e0798bf3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88 PID 5072 wrote to memory of 888 5072 c6e0798bf3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6e0798bf3.exe"C:\Users\Admin\AppData\Local\Temp\c6e0798bf3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99