Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 10:57
Static task
static1
Behavioral task
behavioral1
Sample
b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe
Resource
win7-20230220-en
General
-
Target
b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe
-
Size
270KB
-
MD5
07288e5e03cd70d0ac2cc306bc45083c
-
SHA1
610dd36a7ac135f6a7b130bbe5a8a0f65dfb3475
-
SHA256
b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa
-
SHA512
a15bf038508474fd987390feae4afe4eacb5cb71086535f3ba0ae9c196d6fc53ef848c53ff7da817754adcffa3218ef62a178c8ea36991138a9eb28552407340
-
SSDEEP
3072:J2CMdPt9W8LTxXLJBOf8wm2xxDOmRkgx8NYg+5DkD+IqgUJX07GAC0G4rVwx6C+F:0dl99LTxXTe8wtxkSkYgFvqryPfV+4
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5072 4816 WerFault.exe b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe 3608 4816 WerFault.exe b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe 4288 4816 WerFault.exe b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe 4400 4816 WerFault.exe b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe 2700 4816 WerFault.exe b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe 4260 4816 WerFault.exe b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe 760 4816 WerFault.exe b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3588 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3588 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.execmd.exedescription pid process target process PID 4816 wrote to memory of 2416 4816 b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe cmd.exe PID 4816 wrote to memory of 2416 4816 b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe cmd.exe PID 4816 wrote to memory of 2416 4816 b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe cmd.exe PID 2416 wrote to memory of 3588 2416 cmd.exe taskkill.exe PID 2416 wrote to memory of 3588 2416 cmd.exe taskkill.exe PID 2416 wrote to memory of 3588 2416 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe"C:\Users\Admin\AppData\Local\Temp\b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 6842⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 7802⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 9162⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 7202⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 7882⤵
- Program crash
PID:2700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 7202⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "b58e7960e34921d61b87169ed3465b816145d06f04ab42723688bf12e3201faa.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 7402⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4816 -ip 48161⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4816 -ip 48161⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4816 -ip 48161⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4816 -ip 48161⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4816 -ip 48161⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4816 -ip 48161⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4816 -ip 48161⤵PID:264