| File name: | file |
| Full analysis: | https://app.any.run/tasks/ab5c258e-5a2f-4b3f-86bb-9a6f1606ac80 |
| Verdict: | Malicious activity |
| Threats: | GCleaner is a type of malware loader that has the capability to deliver numerous malicious software programs, which differ based on the location of the targeted victim. This malware is commonly spread through fraudulent websites that advertise free PC optimization tools |
| Analysis date: | December 03, 2023, 01:26:57 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 130C14DAA325CD18D05426FDF6014CB5 |
| SHA1: | 067874F1C4B1318A299F10F090311C6BDDA949C0 |
| SHA256: | 894D4384548BA2E383A7568B57E5FCFD18D36DAB8552142DD7F8C02457B9E4AA |
| SSDEEP: | 49152:t9tQIY7Z4SqvRGVtr2ZjVPVzigMKZiuIJBBheZNzJ8Dm7VFM9uIJ7oLIxX0VSX6t:R7P9i1KZaheLllTE8cxK |
| .dll | | | Win32 Dynamic Link Library (generic) (43.5) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (29.8) |
| .exe | | | Generic Win/DOS Executable (13.2) |
| .exe | | | DOS Executable Generic (13.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:02 12:52:05+01:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 1530431 |
| InitializedDataSize: | 1534 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x177a39 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | Material Design NET 4.0 |
| CompanyName: | - |
| FileDescription: | MaterialSkin |
| FileVersion: | 1.0.0.0 |
| InternalName: | MaterialSkin.exe |
| LegalCopyright: | Copyright © 2014 |
| LegalTrademarks: | - |
| OriginalFileName: | MaterialSkin.exe |
| ProductName: | MaterialSkin |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | "C:\Users\admin\Pictures\tBbzU4Y7Ah6W6NToKIBR9zL1.exe" | C:\Users\admin\Pictures\tBbzU4Y7Ah6W6NToKIBR9zL1.exe | CasPol.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Cleaner installer Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 588 | "C:\Users\admin\Pictures\HYXJXEF8lPUPJ5YrzFkStSSt.exe" | C:\Users\admin\Pictures\HYXJXEF8lPUPJ5YrzFkStSSt.exe | CasPol.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
OnlyLogger(PID) Process(588) HYXJXEF8lPUPJ5YrzFkStSSt.exe C285.209.11.204 | |||||||||||||||
| 684 | "C:\Program Files (x86)\SupportCD\SupportCD.exe" -i | C:\Program Files (x86)\SupportCD\SupportCD.exe | — | APUz0Rpat3gzo6wepIfTOL3V.tmp | |||||||||||
User: admin Integrity Level: HIGH Description: Technical support Exit code: 0 Version: 1, 0, 4, 5 Modules
| |||||||||||||||
| 996 | "C:\Program Files (x86)\SupportCD\SupportCD.exe" -s | C:\Program Files (x86)\SupportCD\SupportCD.exe | APUz0Rpat3gzo6wepIfTOL3V.tmp | ||||||||||||
User: admin Integrity Level: HIGH Description: Technical support Exit code: 0 Version: 1, 0, 4, 5 Modules
| |||||||||||||||
| 1128 | C:\Windows\system32\net1 helpmsg 2 | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1268 | "C:\Windows\System32\cmd.exe" /c taskkill /im "HYXJXEF8lPUPJ5YrzFkStSSt.exe" /f & erase "C:\Users\admin\Pictures\HYXJXEF8lPUPJ5YrzFkStSSt.exe" & exit | C:\Windows\SysWOW64\cmd.exe | — | HYXJXEF8lPUPJ5YrzFkStSSt.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1296 | "C:\Users\admin\AppData\Local\Temp\is-9PGB5.tmp\APUz0Rpat3gzo6wepIfTOL3V.tmp" /SL5="$4901BE,7926731,54272,C:\Users\admin\Pictures\APUz0Rpat3gzo6wepIfTOL3V.exe" | C:\Users\admin\AppData\Local\Temp\is-9PGB5.tmp\APUz0Rpat3gzo6wepIfTOL3V.tmp | — | APUz0Rpat3gzo6wepIfTOL3V.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.52.0.0 Modules
| |||||||||||||||
| 1360 | taskkill /im "HYXJXEF8lPUPJ5YrzFkStSSt.exe" /f | C:\Windows\SysWOW64\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1680 | "C:\Users\admin\AppData\Local\Temp\is-2BD1C.tmp\APUz0Rpat3gzo6wepIfTOL3V.tmp" /SL5="$7037E,7926731,54272,C:\Users\admin\Pictures\APUz0Rpat3gzo6wepIfTOL3V.exe" /SPAWNWND=$7036C /NOTIFYWND=$4901BE | C:\Users\admin\AppData\Local\Temp\is-2BD1C.tmp\APUz0Rpat3gzo6wepIfTOL3V.tmp | — | APUz0Rpat3gzo6wepIfTOL3V.exe | |||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.52.0.0 Modules
| |||||||||||||||
| 1940 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\admin\AppData\Local\Temp\file.exe" -Force | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | file.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| (PID) Process: | (2604) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2604) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2604) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2604) file.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2796) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2796) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2796) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2796) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1940) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2796) CasPol.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2796 | CasPol.exe | C:\Users\admin\Pictures\DYrLn7a2iNTZiPhvFwFhr3Ey.exe | html | |
MD5:5B423612B36CDE7F2745455C5DD82577 | SHA256:E0840D2EA74A00DCC545D770B91D9D889E5A82C7BEDF1B989E0A89DB04685B09 | |||
| 2796 | CasPol.exe | C:\Users\admin\AppData\Local\KIDzdwdkHTPryOCAe1AdoRkz.exe | html | |
MD5:5B423612B36CDE7F2745455C5DD82577 | SHA256:E0840D2EA74A00DCC545D770B91D9D889E5A82C7BEDF1B989E0A89DB04685B09 | |||
| 2796 | CasPol.exe | C:\Users\admin\AppData\Local\OEJSYoQul0KopCyn0olrVNXF.exe | binary | |
MD5:963DA09532E9758ADEDF9745C76EC700 | SHA256:8720B9487CEE7DAE6DB3F8F73273BCBBC56377400B830CA0F089473EBC9603F2 | |||
| 1940 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:7075DAAE179AD066E5FFCB18BB0D46EE | SHA256:627746ABD855AB885DF0BBDE80FAA7E55C06840F612F0375CDCC0F2D2D34CC19 | |||
| 2796 | CasPol.exe | C:\Users\admin\Pictures\FCVrS8fGsx6APycRlGYLDnbE.exe | html | |
MD5:E460D385D25E03BC5BBD9C56B7CAD1E2 | SHA256:E183C92AE131494F190053BDBAF731F3F77C0F64A23B58A215C1B1DA305FFDC3 | |||
| 2796 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gENNCWOclRgJ5pn5UV26jvdX.bat | text | |
MD5:4FC4F45A7C82DD9495C4CA2ACD25A8BA | SHA256:785982909A93B0264BB2CD35108856ABC8DB36CD1038272FE23994B9D51BE8C0 | |||
| 2796 | CasPol.exe | C:\Users\admin\Pictures\8cqDRXcBqEeRxdFpKAVwFPyt.exe | binary | |
MD5:963DA09532E9758ADEDF9745C76EC700 | SHA256:8720B9487CEE7DAE6DB3F8F73273BCBBC56377400B830CA0F089473EBC9603F2 | |||
| 1940 | powershell.exe | C:\Users\admin\AppData\Local\Temp\vagjwfir.mqt.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 1940 | powershell.exe | C:\Users\admin\AppData\Local\Temp\swu4qkq0.jql.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2796 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yH0wp6pKT27jyHd37iyrF2GD.bat | text | |
MD5:3A09A4D3D01E5B9A123C370C4E86F254 | SHA256:619D673123A1C1B511E7159DFDAA1303C01063CB293EE56F262523542CBB3209 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2796 | CasPol.exe | GET | 200 | 91.92.241.91:80 | http://91.92.241.91/files/5.exe | unknown | executable | 241 Kb | unknown |
2796 | CasPol.exe | GET | 200 | 91.92.241.91:80 | http://91.92.241.91/files/InstallSetup24.exe | unknown | executable | 2.33 Mb | unknown |
2796 | CasPol.exe | GET | 200 | 188.114.97.3:80 | http://gobo30cl.top/build.exe | unknown | html | 4.30 Kb | unknown |
2796 | CasPol.exe | GET | 200 | 188.114.97.3:80 | http://stim.graspalace.com/order/tuc4.exe | unknown | executable | 7.80 Mb | unknown |
2796 | CasPol.exe | GET | 301 | 185.26.182.112:80 | http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 | unknown | html | 162 b | unknown |
588 | HYXJXEF8lPUPJ5YrzFkStSSt.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/ip.php | unknown | text | 14 b | unknown |
588 | HYXJXEF8lPUPJ5YrzFkStSSt.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s51 | unknown | text | 38 b | unknown |
588 | HYXJXEF8lPUPJ5YrzFkStSSt.exe | GET | 200 | 194.5.249.115:80 | http://194.5.249.115/files/BIFPuKaW1X.exe | unknown | executable | 414 Kb | unknown |
588 | HYXJXEF8lPUPJ5YrzFkStSSt.exe | GET | 200 | 194.5.249.115:80 | http://194.5.249.115/files/BIFPuKaW1X.exe | unknown | executable | 414 Kb | unknown |
2964 | 6990215683.exe | POST | 200 | 144.76.82.108:80 | http://144.76.82.108/Up | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2796 | CasPol.exe | 172.67.34.170:443 | pastebin.com | CLOUDFLARENET | US | unknown |
2796 | CasPol.exe | 104.20.67.143:443 | pastebin.com | CLOUDFLARENET | — | unknown |
2796 | CasPol.exe | 104.20.68.143:443 | pastebin.com | CLOUDFLARENET | — | unknown |
2796 | CasPol.exe | 91.92.241.91:80 | — | Natskovi & Sie Ltd. | BG | unknown |
2796 | CasPol.exe | 188.114.97.3:80 | gobo30cl.top | CLOUDFLARENET | NL | unknown |
2796 | CasPol.exe | 172.67.216.81:443 | flyawayaero.net | CLOUDFLARENET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
pastebin.com |
| shared |
dns.msftncsi.com |
| shared |
gobo30cl.top |
| malicious |
stim.graspalace.com |
| malicious |
flyawayaero.net |
| unknown |
redirector.pm |
| malicious |
net.geo.opera.com |
| whitelisted |
iplogger.com |
| shared |
yip.su |
| whitelisted |
potatogoose.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
324 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain (iplogger .com in DNS lookup) |
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
2796 | CasPol.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain (iplogger .com in TLS SNI) |
2796 | CasPol.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2796 | CasPol.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2796 | CasPol.exe | A Network Trojan was detected | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 |
2796 | CasPol.exe | A Network Trojan was detected | ET MALWARE Single char EXE direct download likely trojan (multiple families) |
2796 | CasPol.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2796 | CasPol.exe | Potentially Bad Traffic | ET HUNTING Request to .TOP Domain with Minimal Headers |
Process | Message |
|---|---|
file.exe | Could not load file or assembly '924160 bytes loaded from Anonymously Hosted DynamicMethods Assembly, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null' or one of its dependencies. An attempt was made to load a program with an incorrect format.
|