Analysis
-
max time kernel
113s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 13:17
Static task
static1
Behavioral task
behavioral1
Sample
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe
Resource
win7-20230220-en
General
-
Target
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe
-
Size
274KB
-
MD5
7ebea2e3a1e5ae3bc8e224d206bc6f93
-
SHA1
6901a26caeb04f7a85965fef96453078d00114e4
-
SHA256
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e
-
SHA512
f0c2b7f21e20afd28a9528e4b57fecc1e62a1de47a4bf762d438a4b3991ac9d4c66ae07032d2fa92df37def94a72aa293e62f8d5f85dca064180895db84bda7e
-
SSDEEP
6144:u8wLvRMLefcHC+zuMg8KVmOxJRcPsAFDOI9RtyAZcQ2L:yaLefcHuMZTgM3OgBZcQ
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4004 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 4212 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 928 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 1624 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 4044 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 4080 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 3844 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 3432 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe 1668 2080 WerFault.exe 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3736 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3736 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.execmd.exedescription pid process target process PID 2080 wrote to memory of 3468 2080 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe cmd.exe PID 2080 wrote to memory of 3468 2080 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe cmd.exe PID 2080 wrote to memory of 3468 2080 9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe cmd.exe PID 3468 wrote to memory of 3736 3468 cmd.exe taskkill.exe PID 3468 wrote to memory of 3736 3468 cmd.exe taskkill.exe PID 3468 wrote to memory of 3736 3468 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe"C:\Users\Admin\AppData\Local\Temp\9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 4522⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7722⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7802⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7802⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7922⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 9282⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 9762⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 13602⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 5322⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2080 -ip 20801⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2080 -ip 20801⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2080 -ip 20801⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2080 -ip 20801⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2080 -ip 20801⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2080 -ip 20801⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2080 -ip 20801⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2080 -ip 20801⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2080 -ip 20801⤵PID:3928