Analysis
-
max time kernel
133s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 13:18
Static task
static1
Behavioral task
behavioral1
Sample
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe
Resource
win7-20230220-en
General
-
Target
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe
-
Size
331KB
-
MD5
2cb08ca754964460e0c6d81e1250c974
-
SHA1
7f62b1284addc0f579b2ca240352027711d021f0
-
SHA256
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3
-
SHA512
c00361862d1977e1a591a0a2ef21bc35aee37a97ff55ecffeb632a850000456613d497fa76e23a7e676473fd9a4bc325a0443a7bcf95fda512e3a08e314785ad
-
SSDEEP
6144:H5XlqHQCFVZqVFbFso4D3N/B3yoGkaFtZWfdW4TE3v1144C0K:H9sHQCFVQVFb095CGaFtZ4dW1cn
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 808 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 2764 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 684 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 3428 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 4848 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 2088 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 3624 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 2492 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 1072 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 4968 2116 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3768 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exepid process 2116 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 2116 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3768 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.execmd.exedescription pid process target process PID 2116 wrote to memory of 3892 2116 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 2116 wrote to memory of 3892 2116 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 2116 wrote to memory of 3892 2116 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 3892 wrote to memory of 3768 3892 cmd.exe taskkill.exe PID 3892 wrote to memory of 3768 3892 cmd.exe taskkill.exe PID 3892 wrote to memory of 3768 3892 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe"C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 4522⤵
- Program crash
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 7642⤵
- Program crash
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 7842⤵
- Program crash
PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 7842⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 8362⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 9282⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 9362⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 10402⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 13682⤵
- Program crash
PID:1072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 14882⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2116 -ip 21161⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2116 -ip 21161⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2116 -ip 21161⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2116 -ip 21161⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2116 -ip 21161⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2116 -ip 21161⤵PID:572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2116 -ip 21161⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2116 -ip 21161⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2116 -ip 21161⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2116 -ip 21161⤵PID:3876