| File name: | 84bacbdbc035516c8d2dccddc6457391.exe |
| Full analysis: | https://app.any.run/tasks/4ed0b0d4-a89c-4f4e-9522-eb3d39352737 |
| Verdict: | Malicious activity |
| Threats: | GCleaner is a type of malware loader that has the capability to deliver numerous malicious software programs, which differ based on the location of the targeted victim. This malware is commonly spread through fraudulent websites that advertise free PC optimization tools |
| Analysis date: | December 02, 2023, 17:05:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 84BACBDBC035516C8D2DCCDDC6457391 |
| SHA1: | C16D7F6E358EF91C8594BB7FC329A4B3DAAD5014 |
| SHA256: | 3F9DEA18016627459BB9A1DC0E11C85BA9B3E550F114DD1CD05357A4FFA1DA62 |
| SSDEEP: | 24576:CA/21lETVrlf4FAa5qZf/yE0Z/XSF5EXad5EXa+0Z/XSfl:CA/21lETVxf47sXl0VSX6af6a+0VSfl |
| .dll | | | Win32 Dynamic Link Library (generic) (43.5) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (29.8) |
| .exe | | | Generic Win/DOS Executable (13.2) |
| .exe | | | DOS Executable Generic (13.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:02 12:52:05+01:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 1027107 |
| InitializedDataSize: | 1534 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xfcc1d |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | Material Design NET 4.0 |
| CompanyName: | - |
| FileDescription: | MaterialSkin |
| FileVersion: | 1.0.0.0 |
| InternalName: | MaterialSkin.exe |
| LegalCopyright: | Copyright © 2014 |
| LegalTrademarks: | - |
| OriginalFileName: | MaterialSkin.exe |
| ProductName: | MaterialSkin |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1000 | "C:\Users\admin\Pictures\zFLOalfSWC8z6kDmMWZCxJIe.exe" | C:\Users\admin\Pictures\zFLOalfSWC8z6kDmMWZCxJIe.exe | CasPol.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
OnlyLogger(PID) Process(1000) zFLOalfSWC8z6kDmMWZCxJIe.exe C285.209.11.204 | |||||||||||||||
| 1940 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\admin\AppData\Local\Temp\84bacbdbc035516c8d2dccddc6457391.exe" -Force | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | 84bacbdbc035516c8d2dccddc6457391.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 2604 | "C:\Users\admin\AppData\Local\Temp\84bacbdbc035516c8d2dccddc6457391.exe" | C:\Users\admin\AppData\Local\Temp\84bacbdbc035516c8d2dccddc6457391.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: MaterialSkin Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2708 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe | 84bacbdbc035516c8d2dccddc6457391.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Framework CAS Policy Manager Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| (PID) Process: | (2604) 84bacbdbc035516c8d2dccddc6457391.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2604) 84bacbdbc035516c8d2dccddc6457391.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2604) 84bacbdbc035516c8d2dccddc6457391.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2604) 84bacbdbc035516c8d2dccddc6457391.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2708) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2708) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2708) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2708) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1940) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2708) CasPol.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1940 | powershell.exe | C:\Users\admin\AppData\Local\Temp\easpbnv3.bog.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 1940 | powershell.exe | C:\Users\admin\AppData\Local\Temp\wzdoieb1.k0p.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2708 | CasPol.exe | C:\Users\admin\Pictures\zFLOalfSWC8z6kDmMWZCxJIe.exe | executable | |
MD5:D0E991A3F9537689CE98EECB69DA57CF | SHA256:7D1B712ECCF7F2C8B250487359E20B1276880C4B350EBD8A1AC4C39984F9500D | |||
| 1940 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:25546DE50669EB02F4BD7C647A0A3AB5 | SHA256:67CF9FE984D2B52CE9CE55D85494384C320D22D037972377BEDD1CF52273C8A3 | |||
| 1000 | zFLOalfSWC8z6kDmMWZCxJIe.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\s52[1].htm | binary | |
MD5:E1671797C52E15F763380B45E841EC32 | SHA256:3F79BB7B435B05321651DAEFD374CDC681DC06FAA65E374E38337B88CA046DEA | |||
| 2708 | CasPol.exe | C:\Users\admin\Pictures\6V8ABrdZ7itlw9c8Nyx51VRB.exe | html | |
MD5:C1B7B9EE49CC3944709321C3D7236C20 | SHA256:0C4058D00AA8CBE7D7CF3E29A93B8C0C8A635078177DD02A459515A4A0E1A4AE | |||
| 2708 | CasPol.exe | C:\Users\admin\AppData\Local\YQsowKBPVcJtZpKccOchRZsW.exe | html | |
MD5:DDE72AE232DC63298465861482D7BB93 | SHA256:0032588B8D93A807CF0F48A806CCF125677503A6FABE4105A6DC69E81ACE6091 | |||
| 2708 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8NJrew27pvZJG5u99UbkEqPl.bat | text | |
MD5:EE5BC4BCF7537C8C03881FDEF25A9BC1 | SHA256:31D718F2BEE0CEDC6B0F116E005014472CDFED73A17D52CEE95FEBA143CC692F | |||
| 2708 | CasPol.exe | C:\Users\admin\AppData\Local\O8RrINydJVrMLcoUSr6DJ9r8.exe | html | |
MD5:5B423612B36CDE7F2745455C5DD82577 | SHA256:E0840D2EA74A00DCC545D770B91D9D889E5A82C7BEDF1B989E0A89DB04685B09 | |||
| 2708 | CasPol.exe | C:\Users\admin\Pictures\fuzXrB4OQTp5KLMRR6O6kiFE.exe | html | |
MD5:5B423612B36CDE7F2745455C5DD82577 | SHA256:E0840D2EA74A00DCC545D770B91D9D889E5A82C7BEDF1B989E0A89DB04685B09 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1000 | zFLOalfSWC8z6kDmMWZCxJIe.exe | GET | — | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s53 | unknown | — | — | unknown |
1000 | zFLOalfSWC8z6kDmMWZCxJIe.exe | GET | — | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s53 | unknown | — | — | unknown |
2708 | CasPol.exe | GET | 200 | 91.92.241.91:80 | http://91.92.241.91/files/5.exe | unknown | executable | 241 Kb | unknown |
2708 | CasPol.exe | GET | 301 | 185.26.182.111:80 | http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 | unknown | html | 162 b | unknown |
2708 | CasPol.exe | GET | — | 188.114.96.3:80 | http://api.himanfast.com/order/tuc7.exe | unknown | — | — | unknown |
2708 | CasPol.exe | GET | 200 | 188.114.96.3:80 | http://gobo30cl.top/build.exe | unknown | html | 4.30 Kb | unknown |
2708 | CasPol.exe | GET | — | 98.126.19.29:80 | http://98.126.19.29/s/twelv.exe | unknown | — | — | unknown |
1000 | zFLOalfSWC8z6kDmMWZCxJIe.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/ip.php | unknown | text | 13 b | unknown |
1000 | zFLOalfSWC8z6kDmMWZCxJIe.exe | GET | — | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s51 | unknown | — | — | unknown |
2708 | CasPol.exe | GET | 200 | 91.106.207.26:80 | http://hblmbtbm.beget.tech/385118/setup.exe | unknown | html | 274 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2708 | CasPol.exe | 104.20.67.143:443 | pastebin.com | CLOUDFLARENET | — | unknown |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2708 | CasPol.exe | 188.114.96.3:443 | yip.su | CLOUDFLARENET | NL | unknown |
2708 | CasPol.exe | 194.49.94.47:80 | — | Enes Koken | DE | unknown |
2708 | CasPol.exe | 194.49.94.98:80 | — | Enes Koken | DE | unknown |
2708 | CasPol.exe | 91.92.241.91:80 | — | Natskovi & Sie Ltd. | BG | unknown |
Domain | IP | Reputation |
|---|---|---|
yip.su |
| whitelisted |
pastebin.com |
| shared |
gobo30cl.top |
| malicious |
flyawayaero.net |
| unknown |
hblmbtbm.beget.tech |
| malicious |
rawcracker.com |
| malicious |
net.geo.opera.com |
| whitelisted |
api.himanfast.com |
| unknown |
iplogger.com |
| shared |
bobkelsofan.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
324 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain (iplogger .com in DNS lookup) |
2708 | CasPol.exe | A Network Trojan was detected | ET MALWARE Single char EXE direct download likely trojan (multiple families) |
2708 | CasPol.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2708 | CasPol.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2708 | CasPol.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain (iplogger .com in TLS SNI) |
2708 | CasPol.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2708 | CasPol.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2708 | CasPol.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
84bacbdbc035516c8d2dccddc6457391.exe | Could not load file or assembly '420864 bytes loaded from Anonymously Hosted DynamicMethods Assembly, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null' or one of its dependencies. An attempt was made to load a program with an incorrect format.
|