Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-05-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe
Resource
win10v2004-20240226-en
General
-
Target
d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe
-
Size
262KB
-
MD5
8b9353cb3b64da37174d34c3c43eb6dc
-
SHA1
4b1cda570950f562c49a84e052037dfe7cae9d92
-
SHA256
d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8
-
SHA512
4ec2607cbaed9e28bdb579627cc2a6ca295039d8226cec21221c22e6513b3d3a7cbb962b996b2fe6c0afd18b5237bbdd266a7b399c9649de055b7e6611ebb56f
-
SSDEEP
6144:pptiwAsTI5qszTtKBli++fUJdf67yZDHY:pptiwAiI591++MJp6m
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1780 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 1188 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 4136 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 1728 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 1688 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 1620 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 3140 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 2060 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 2856 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe 920 1372 WerFault.exe d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3724 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3724 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.execmd.exedescription pid process target process PID 1372 wrote to memory of 2068 1372 d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe cmd.exe PID 1372 wrote to memory of 2068 1372 d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe cmd.exe PID 1372 wrote to memory of 2068 1372 d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe cmd.exe PID 2068 wrote to memory of 3724 2068 cmd.exe taskkill.exe PID 2068 wrote to memory of 3724 2068 cmd.exe taskkill.exe PID 2068 wrote to memory of 3724 2068 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe"C:\Users\Admin\AppData\Local\Temp\d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 3642⤵
- Program crash
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 4802⤵
- Program crash
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 7802⤵
- Program crash
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 8002⤵
- Program crash
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 8322⤵
- Program crash
PID:1688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 8802⤵
- Program crash
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 9842⤵
- Program crash
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 10682⤵
- Program crash
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 14602⤵
- Program crash
PID:2856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "d573c52d123b2108172188f04d5deb983b6a8c73be5e5b660e567da1f91e96a8.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 12762⤵
- Program crash
PID:920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1372 -ip 13721⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1372 -ip 13721⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1372 -ip 13721⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1372 -ip 13721⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1372 -ip 13721⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1372 -ip 13721⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1372 -ip 13721⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1372 -ip 13721⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1372 -ip 13721⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1372 -ip 13721⤵PID:832