Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe
Resource
win10v2004-20240508-en
General
-
Target
1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe
-
Size
229KB
-
MD5
4a13730c7eb6bdc60ca85dc1ea8ef7e3
-
SHA1
668cbafab52b9e64eca74daa58df0466ecdbde2b
-
SHA256
1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b
-
SHA512
263d9dca71f0fed48ca26f76fd2000f3392ed49583ea3f29a4c14cf8c76f4565df0f4d3a585611c3cd54e72cccfae0f6b5e87654bf9cf321b7907031b2319f6a
-
SSDEEP
3072:LjBcWuMsx5zq+Is6Uzrni/5YJaTNH49WoZyfiLj33OrZ7xM2dZ+0c22CSWLYS:Lq1LQ4e/5YQO9EiWrHM2dZ+l22F0Y
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4672 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 4676 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 532 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 1556 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 2332 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 3608 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 2944 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 3596 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe 1728 3640 WerFault.exe 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3336 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3336 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.execmd.exedescription pid process target process PID 3640 wrote to memory of 556 3640 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe cmd.exe PID 3640 wrote to memory of 556 3640 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe cmd.exe PID 3640 wrote to memory of 556 3640 1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe cmd.exe PID 556 wrote to memory of 3336 556 cmd.exe taskkill.exe PID 556 wrote to memory of 3336 556 cmd.exe taskkill.exe PID 556 wrote to memory of 3336 556 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe"C:\Users\Admin\AppData\Local\Temp\1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 7402⤵
- Program crash
PID:4672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 7802⤵
- Program crash
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 7802⤵
- Program crash
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 8162⤵
- Program crash
PID:1556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 9042⤵
- Program crash
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 10042⤵
- Program crash
PID:3608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 9882⤵
- Program crash
PID:2944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 12762⤵
- Program crash
PID:3596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1c9771c3735634b732c6eeecd82ad610825f574a97f7823bbf9fe43a918fa79b.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 13042⤵
- Program crash
PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3640 -ip 36401⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3640 -ip 36401⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3640 -ip 36401⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3640 -ip 36401⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3640 -ip 36401⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3640 -ip 36401⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3640 -ip 36401⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3640 -ip 36401⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3640 -ip 36401⤵PID:888