Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe
Resource
win10v2004-20240508-en
General
-
Target
e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe
-
Size
288KB
-
MD5
3086fc47b4190ec7360d60d6d4ff1bda
-
SHA1
64372c56e3bc982b11c0dcf42c94ad413bc76ff7
-
SHA256
e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5
-
SHA512
8c25a5ce9ec59870b7a423247329c7dadf159216b92bc4e93b1738bdcf71c2529dbb19042098874550c894c86f0c03a60e02b2b482bfdbc802ead3a0cf6608d3
-
SSDEEP
3072:LOJV53XgJZ6sO6j+znXlgQm5mn+ZQnmP2nbn/s+CO90Y7ysZ1w5FFN+qR8uibMFg:LJ5anvmqn/sWW40N+qPiAFaskIOZ40
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2040 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 2852 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 3200 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 3420 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 392 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 4000 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 1212 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 3184 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 2560 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe 3848 2972 WerFault.exe e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3204 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3204 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.execmd.exedescription pid process target process PID 2972 wrote to memory of 852 2972 e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe cmd.exe PID 2972 wrote to memory of 852 2972 e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe cmd.exe PID 2972 wrote to memory of 852 2972 e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe cmd.exe PID 852 wrote to memory of 3204 852 cmd.exe taskkill.exe PID 852 wrote to memory of 3204 852 cmd.exe taskkill.exe PID 852 wrote to memory of 3204 852 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe"C:\Users\Admin\AppData\Local\Temp\e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 4602⤵
- Program crash
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 4882⤵
- Program crash
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 7482⤵
- Program crash
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 7682⤵
- Program crash
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 7682⤵
- Program crash
PID:392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 8402⤵
- Program crash
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 9122⤵
- Program crash
PID:1212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 10122⤵
- Program crash
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 13362⤵
- Program crash
PID:2560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "e0fa2dad2f6260cd87cffc06b7c5d71eaeb0c32ae9b8504d55e093e3439c0be5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 12842⤵
- Program crash
PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2972 -ip 29721⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2972 -ip 29721⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2972 -ip 29721⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2972 -ip 29721⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2972 -ip 29721⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2972 -ip 29721⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2972 -ip 29721⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2972 -ip 29721⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2972 -ip 29721⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2972 -ip 29721⤵PID:2440