Analysis
-
max time kernel
162s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 11:26
Static task
static1
Behavioral task
behavioral1
Sample
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe
Resource
win7-20230220-en
General
-
Target
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe
-
Size
332KB
-
MD5
be8060c6a8398acadab32498f98f5556
-
SHA1
e759f4222f13d900ba19a2c7fc911a9dcd8a0909
-
SHA256
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522
-
SHA512
3f649fb726039bb4ff4ed3186de7141c1b3ad0911f6ea7fefef0fef3f08abefafa70faa870a6b9eafbd5f3ab58dfb45be165ed52f87ede1155fefbab4ae4d6ad
-
SSDEEP
6144:QVXnCBimgu6LoCECJQv/zox+ePEczZ+mWdZe5+wOC0K:QxCBim4dECy/Ex+enQZXw5n
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3844 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe 4812 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe 3804 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe 4944 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe 508 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe 2852 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe 4672 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe 1392 1952 WerFault.exe b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1784 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1784 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.execmd.exedescription pid process target process PID 1952 wrote to memory of 4256 1952 b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe cmd.exe PID 1952 wrote to memory of 4256 1952 b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe cmd.exe PID 1952 wrote to memory of 4256 1952 b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe cmd.exe PID 4256 wrote to memory of 1784 4256 cmd.exe taskkill.exe PID 4256 wrote to memory of 1784 4256 cmd.exe taskkill.exe PID 4256 wrote to memory of 1784 4256 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe"C:\Users\Admin\AppData\Local\Temp\b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 7482⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 7882⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 9282⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 9362⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 7842⤵
- Program crash
PID:508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 7922⤵
- Program crash
PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 9722⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "b4a0890b7b896b28d86af7c066ce54f9a9f51e17fc7e78349a1ceee92114f522.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 9402⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1952 -ip 19521⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1952 -ip 19521⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1952 -ip 19521⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1952 -ip 19521⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1952 -ip 19521⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1952 -ip 19521⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1952 -ip 19521⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1952 -ip 19521⤵PID:2256