Analysis

  • max time kernel
    34s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 23:38

General

  • Target

    204680ebb902c03fc8ac63e1e8db35e6.exe

  • Size

    294KB

  • MD5

    204680ebb902c03fc8ac63e1e8db35e6

  • SHA1

    aaaa13b07e80f83aed86a269302250ec9e91902f

  • SHA256

    022cc862b01a4ea5ef46ca085f97c646a596df977d82fd56725660567e72d528

  • SHA512

    faeecfd2b16316eb0fdfe6a4f9b400073a08d19e7d60d9ddb66021cfca1a613846c7a48aa9320df29de468f7a3f90468408f6e61d9cac3e29cd9a719fc8f9c30

  • SSDEEP

    6144:LufWiuhqi10OxtTUq9zJUpxL4JcctQOL0tR1:LufWik0IjqEZQj1

Score
10/10

Malware Config

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 10 IoCs
  • Kills process with taskkill 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\204680ebb902c03fc8ac63e1e8db35e6.exe
    "C:\Users\Admin\AppData\Local\Temp\204680ebb902c03fc8ac63e1e8db35e6.exe"
    1⤵
      PID:1316
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 748
        2⤵
        • Program crash
        PID:3608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 768
        2⤵
        • Program crash
        PID:4908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 768
        2⤵
        • Program crash
        PID:2104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 820
        2⤵
        • Program crash
        PID:3616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 912
        2⤵
        • Program crash
        PID:1536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1004
        2⤵
        • Program crash
        PID:1004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1076
        2⤵
        • Program crash
        PID:1696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1596
        2⤵
        • Program crash
        PID:4164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1768
        2⤵
        • Program crash
        PID:2668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1704
        2⤵
        • Program crash
        PID:4568
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im "204680ebb902c03fc8ac63e1e8db35e6.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\204680ebb902c03fc8ac63e1e8db35e6.exe" & exit
        2⤵
          PID:668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 1316 -ip 1316
        1⤵
          PID:4612
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1316 -ip 1316
          1⤵
            PID:4508
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1316 -ip 1316
            1⤵
              PID:668
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /im "204680ebb902c03fc8ac63e1e8db35e6.exe" /f
                2⤵
                • Kills process with taskkill
                PID:4420
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1316 -ip 1316
              1⤵
                PID:2804
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1316 -ip 1316
                1⤵
                  PID:2964
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1316 -ip 1316
                  1⤵
                    PID:2944
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1316 -ip 1316
                    1⤵
                      PID:4920
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1316 -ip 1316
                      1⤵
                        PID:4176
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1316 -ip 1316
                        1⤵
                          PID:2420
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1316 -ip 1316
                          1⤵
                            PID:1220

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • memory/1316-2-0x0000000004A70000-0x0000000004ABA000-memory.dmp

                            Filesize

                            296KB

                          • memory/1316-1-0x0000000002E50000-0x0000000002F50000-memory.dmp

                            Filesize

                            1024KB

                          • memory/1316-3-0x0000000000400000-0x0000000002CD8000-memory.dmp

                            Filesize

                            40.8MB

                          • memory/1316-4-0x0000000000400000-0x0000000002CD8000-memory.dmp

                            Filesize

                            40.8MB

                          • memory/1316-7-0x0000000004A70000-0x0000000004ABA000-memory.dmp

                            Filesize

                            296KB

                          • memory/1316-6-0x0000000002E50000-0x0000000002F50000-memory.dmp

                            Filesize

                            1024KB

                          • memory/1316-9-0x0000000000400000-0x0000000002CD8000-memory.dmp

                            Filesize

                            40.8MB