Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 15:48
Static task
static1
Behavioral task
behavioral1
Sample
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe
Resource
win7-20230220-en
General
-
Target
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe
-
Size
273KB
-
MD5
bfe0a34bb6494a9b1e866efe97ccd11b
-
SHA1
2222524e5bf603c3166ed445ae5f94f2ebe1fc6e
-
SHA256
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5
-
SHA512
9520cace14670c5aff3fcad7476c231d04b4a8b152f0af12cabbcc1a4947ca9007a2a65e3cf010e9a6dfd0f2388cc58def7d8e28338c3f516c0733613e28111c
-
SSDEEP
6144:5qgB6W89GHqzCzKDJUF3sIcqZi5WZbvEeTqa48Hd/:5qgB6bGHqzCGUF3niUHz485
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3200 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 4500 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 4472 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 4912 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 708 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 3676 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 3196 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 4648 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 2924 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe 3744 3548 WerFault.exe 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3748 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3748 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.execmd.exedescription pid process target process PID 3548 wrote to memory of 4316 3548 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe cmd.exe PID 3548 wrote to memory of 4316 3548 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe cmd.exe PID 3548 wrote to memory of 4316 3548 8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe cmd.exe PID 4316 wrote to memory of 3748 4316 cmd.exe taskkill.exe PID 4316 wrote to memory of 3748 4316 cmd.exe taskkill.exe PID 4316 wrote to memory of 3748 4316 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe"C:\Users\Admin\AppData\Local\Temp\8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 4562⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 7722⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 7922⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 7922⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 8482⤵
- Program crash
PID:708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 9322⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 9642⤵
- Program crash
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 10762⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 13682⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "8a2ed465f876e200314451371c46e38ddb7dae622efe7f60bb7d58d9291651d5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 14882⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3548 -ip 35481⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3548 -ip 35481⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3548 -ip 35481⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3548 -ip 35481⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3548 -ip 35481⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3548 -ip 35481⤵PID:816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3548 -ip 35481⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3548 -ip 35481⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3548 -ip 35481⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3548 -ip 35481⤵PID:3608