Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
get.exe
Resource
win7-20240903-en
General
-
Target
get.exe
-
Size
6.9MB
-
MD5
4407e12c37de8a5990d74cf40f00f200
-
SHA1
c2309e32199ae9702d091b319484bca44cb887a4
-
SHA256
f928de875315f0ec8a25027b5ec20476f59c2ee1de3d9076e884a18ffa744fbf
-
SHA512
e0c5d53a1a3662058d5c3b5df6fed25bb5432caa4c3ea78b99256ef8010699f8f7b9be0294622945d84f895ed8b5211c64e9e396d72aeeac25e0a92b3d8de064
-
SSDEEP
98304:iQe3d8R79GHBtnn0l7gwUc9/2Nxt5XF0:HeiXBlswU0OV5
Malware Config
Extracted
gcleaner
185.156.73.73
Signatures
-
Gcleaner family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 10 3440 BitLockerToGo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1564 set thread context of 3440 1564 get.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language get.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85 PID 1564 wrote to memory of 3440 1564 get.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\get.exe"C:\Users\Admin\AppData\Local\Temp\get.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99