Analysis
-
max time kernel
92s -
max time network
102s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-05-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe
Resource
win10v2004-20240508-en
General
-
Target
3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe
-
Size
234KB
-
MD5
60b9b80da7cdf25e17d20237ffab3a0f
-
SHA1
60388ce98e2dd4774cbf86b555214256677425df
-
SHA256
3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58
-
SHA512
5c69f4a85e9c189bfee6072f8026165d734005e53ca5b31e43098eb764939f8f0242bf5e217350a4f8141177d36a4e9321778c57ff3bf6aaea13d68a1d6e816f
-
SSDEEP
6144:SjY7MH9Pb0DVvRMQsmYbGPS8PHr0cnt2vr:cY7sb0DvMx7mScL0cnk
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1700 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe 4200 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe 4908 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe 3128 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe 3412 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe 4976 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe 3304 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe 3836 1944 WerFault.exe 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2400 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2400 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.execmd.exedescription pid process target process PID 1944 wrote to memory of 3416 1944 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe cmd.exe PID 1944 wrote to memory of 3416 1944 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe cmd.exe PID 1944 wrote to memory of 3416 1944 3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe cmd.exe PID 3416 wrote to memory of 2400 3416 cmd.exe taskkill.exe PID 3416 wrote to memory of 2400 3416 cmd.exe taskkill.exe PID 3416 wrote to memory of 2400 3416 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe"C:\Users\Admin\AppData\Local\Temp\3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 7722⤵
- Program crash
PID:1700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 7922⤵
- Program crash
PID:4200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 8082⤵
- Program crash
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 7842⤵
- Program crash
PID:3128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 9602⤵
- Program crash
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 9682⤵
- Program crash
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 14282⤵
- Program crash
PID:3304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3fe8c3ec19eb2e6231d316f84a460558149305d523bbb2c7d8a4eb25cfd03b58.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 15362⤵
- Program crash
PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1944 -ip 19441⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1944 -ip 19441⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1944 -ip 19441⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1944 -ip 19441⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1944 -ip 19441⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1944 -ip 19441⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1944 -ip 19441⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1944 -ip 19441⤵PID:3164