Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-05-2024 23:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe
Resource
win10v2004-20240426-en
7 signatures
150 seconds
General
-
Target
84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe
-
Size
334KB
-
MD5
3073202ca0b82b8bfd4cdb1bf7f7af46
-
SHA1
3b10d38e15d5d846e7f9b57d7af838de344e6cc5
-
SHA256
84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624
-
SHA512
0bf78f6973ca8352f5a4e3abf0ed8b92b80e64488affe111ef1a235825f3c9e1c730e22e2746e1874dc965126a4dce82ad987e14818d0c772cbc6d2390f140ad
-
SSDEEP
6144:hfURUKGHLQle+zA+gd46SHAphzpBx/Bnnor0rkuT:hfURUKQL6zAhd46ZR5nnKikm
Malware Config
Extracted
Family
gcleaner
C2
185.172.128.90
5.42.65.64
Attributes
-
url_path
/advdlc.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 424 1372 WerFault.exe 79 5040 1372 WerFault.exe 79 1340 1372 WerFault.exe 79 4520 1372 WerFault.exe 79 872 1372 WerFault.exe 79 3436 1372 WerFault.exe 79 2760 1372 WerFault.exe 79 4512 1372 WerFault.exe 79 3184 1372 WerFault.exe 79 -
Kills process with taskkill 1 IoCs
pid Process 3116 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3116 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1372 wrote to memory of 572 1372 84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe 97 PID 1372 wrote to memory of 572 1372 84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe 97 PID 1372 wrote to memory of 572 1372 84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe 97 PID 572 wrote to memory of 3116 572 cmd.exe 101 PID 572 wrote to memory of 3116 572 cmd.exe 101 PID 572 wrote to memory of 3116 572 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe"C:\Users\Admin\AppData\Local\Temp\84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 7722⤵
- Program crash
PID:424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 7802⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 8442⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 7762⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 9762⤵
- Program crash
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 10802⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 14282⤵
- Program crash
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "84423fbcabad0b13625b18653e4ae033d4579b247c7a992434c2688e5d730624.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 13322⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 13882⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1372 -ip 13721⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1372 -ip 13721⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1372 -ip 13721⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1372 -ip 13721⤵PID:240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1372 -ip 13721⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1372 -ip 13721⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1372 -ip 13721⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1372 -ip 13721⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1372 -ip 13721⤵PID:2484