Analysis
-
max time kernel
130s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe
Resource
win10v2004-20240426-en
General
-
Target
d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe
-
Size
283KB
-
MD5
1c77ac518b998b4649c9db9115819bf5
-
SHA1
fcb2b5998bbf741a76df612be91da2959b14f4cd
-
SHA256
d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273
-
SHA512
6cfc6447084fbd9b6877eb3e90f68664a4268dcde6eb68251e7174ea5ad5301f30b7b504d12936f4b818ba334494a901506c4fb7245ec3abadbcfc84eea3a079
-
SSDEEP
6144:j2O8YDWkNz7jMq7OjoUCMCw6SmWKIeeo61LbPeT3Y:j2OVDWmzUq7OqmFKIIq
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1560 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 2036 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 3008 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 4824 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 4856 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 4428 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 3784 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 3448 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 736 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe 588 1880 WerFault.exe d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4432 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4432 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.execmd.exedescription pid process target process PID 1880 wrote to memory of 1836 1880 d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe cmd.exe PID 1880 wrote to memory of 1836 1880 d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe cmd.exe PID 1880 wrote to memory of 1836 1880 d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe cmd.exe PID 1836 wrote to memory of 4432 1836 cmd.exe taskkill.exe PID 1836 wrote to memory of 4432 1836 cmd.exe taskkill.exe PID 1836 wrote to memory of 4432 1836 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe"C:\Users\Admin\AppData\Local\Temp\d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 4522⤵
- Program crash
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 4842⤵
- Program crash
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 7482⤵
- Program crash
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 7562⤵
- Program crash
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 8002⤵
- Program crash
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 8082⤵
- Program crash
PID:4428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 9122⤵
- Program crash
PID:3784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 9882⤵
- Program crash
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 13442⤵
- Program crash
PID:736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "d9caf6972a0f22528686354f7e994b3853f86661c11c2b804733b967ccca4273.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 14642⤵
- Program crash
PID:588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1880 -ip 18801⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1880 -ip 18801⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1880 -ip 18801⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1880 -ip 18801⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1880 -ip 18801⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1880 -ip 18801⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1880 -ip 18801⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1880 -ip 18801⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1880 -ip 18801⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1880 -ip 18801⤵PID:4996