Analysis
-
max time kernel
111s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 01:06
Static task
static1
Behavioral task
behavioral1
Sample
3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe
Resource
win7-20230220-en
General
-
Target
3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe
-
Size
270KB
-
MD5
0e64802a39def8b062a90ac724456d44
-
SHA1
7745f11285f663d01c01bfb55e230f7a871e7f52
-
SHA256
3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5
-
SHA512
1d684bc2de3bae0b50e3fd15dd3824e40ae5ee22c6983378c76f06d248f77d2dc231eb04ce5f880db400ea7b54da4914491df2d4006f18b89fcfaa3b1b947906
-
SSDEEP
6144:l6GXXyJP2yz6cWUcoKBPnjoc8vO+Tn849:gqCJP2ylWn9jmLr
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3084 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 3712 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 228 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 4760 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 3612 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 904 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 5068 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 3876 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 1804 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe 1036 4924 WerFault.exe 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4832 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4832 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.execmd.exedescription pid process target process PID 4924 wrote to memory of 2852 4924 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe cmd.exe PID 4924 wrote to memory of 2852 4924 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe cmd.exe PID 4924 wrote to memory of 2852 4924 3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe cmd.exe PID 2852 wrote to memory of 4832 2852 cmd.exe taskkill.exe PID 2852 wrote to memory of 4832 2852 cmd.exe taskkill.exe PID 2852 wrote to memory of 4832 2852 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe"C:\Users\Admin\AppData\Local\Temp\3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 4562⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7642⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7842⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7842⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8162⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9282⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9762⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 10722⤵
- Program crash
PID:3876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 13842⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3aa97a5e2d24316daca7529266216886cf888b6643b77c1e6c51ea42600e61c5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 13082⤵
- Program crash
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4924 -ip 49241⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4924 -ip 49241⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4924 -ip 49241⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4924 -ip 49241⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4924 -ip 49241⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4924 -ip 49241⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4924 -ip 49241⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4924 -ip 49241⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4924 -ip 49241⤵PID:3140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4924 -ip 49241⤵PID:3700