Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 15:48
Static task
static1
Behavioral task
behavioral1
Sample
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe
Resource
win7-20230220-en
General
-
Target
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe
-
Size
331KB
-
MD5
2cb08ca754964460e0c6d81e1250c974
-
SHA1
7f62b1284addc0f579b2ca240352027711d021f0
-
SHA256
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3
-
SHA512
c00361862d1977e1a591a0a2ef21bc35aee37a97ff55ecffeb632a850000456613d497fa76e23a7e676473fd9a4bc325a0443a7bcf95fda512e3a08e314785ad
-
SSDEEP
6144:H5XlqHQCFVZqVFbFso4D3N/B3yoGkaFtZWfdW4TE3v1144C0K:H9sHQCFVQVFb095CGaFtZ4dW1cn
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2128 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 3916 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 2552 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 4888 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 2660 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 4720 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 1828 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 3180 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 3544 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 3164 740 WerFault.exe 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1604 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exepid process 740 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe 740 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1604 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.execmd.exedescription pid process target process PID 740 wrote to memory of 1492 740 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 740 wrote to memory of 1492 740 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 740 wrote to memory of 1492 740 43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe cmd.exe PID 1492 wrote to memory of 1604 1492 cmd.exe taskkill.exe PID 1492 wrote to memory of 1604 1492 cmd.exe taskkill.exe PID 1492 wrote to memory of 1604 1492 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe"C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 4522⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 7642⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 7842⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 7842⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 7642⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 9282⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 10042⤵
- Program crash
PID:1828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 9322⤵
- Program crash
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 13642⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "43c684cde21885bd1a7add14846c6ce0ab374a6ff7163b655ec80186620770d3.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 13882⤵
- Program crash
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 740 -ip 7401⤵PID:980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 740 -ip 7401⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 740 -ip 7401⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 740 -ip 7401⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 740 -ip 7401⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 740 -ip 7401⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 740 -ip 7401⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 740 -ip 7401⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 740 -ip 7401⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 740 -ip 7401⤵PID:2320