Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe
Resource
win10v2004-20240508-en
General
-
Target
81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe
-
Size
288KB
-
MD5
d40b168ab9d25d52e91f20dbf283a162
-
SHA1
863f9c0b44663557491ca689c4e2903d6943bd42
-
SHA256
81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17
-
SHA512
ed4fba4db33b795fc5b4bfbc676643c7259a8f9a3645c9af72406c0fabfc5383cac8ec406a46cee7692a7af13786afead94f23162bb861e83a3bdce07441c800
-
SSDEEP
3072:1fJK/2u70bPua1yBj+2nvlApmRqMHYL8VO6Gvqo3eMwc89M/V8iHpcCHoNbmUoZ9:1ozLD0hOYLmO6C5l8O/CiJemUoSyZ40
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1496 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 3984 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 3896 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 2352 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 2180 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 1780 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 4460 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 3208 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 3664 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 392 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe 3312 3624 WerFault.exe 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1896 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1896 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.execmd.exedescription pid process target process PID 3624 wrote to memory of 3668 3624 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe cmd.exe PID 3624 wrote to memory of 3668 3624 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe cmd.exe PID 3624 wrote to memory of 3668 3624 81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe cmd.exe PID 3668 wrote to memory of 1896 3668 cmd.exe taskkill.exe PID 3668 wrote to memory of 1896 3668 cmd.exe taskkill.exe PID 3668 wrote to memory of 1896 3668 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe"C:\Users\Admin\AppData\Local\Temp\81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 4522⤵
- Program crash
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 4802⤵
- Program crash
PID:3984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7482⤵
- Program crash
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7882⤵
- Program crash
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8082⤵
- Program crash
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7882⤵
- Program crash
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 9122⤵
- Program crash
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 10082⤵
- Program crash
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 10322⤵
- Program crash
PID:3664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 13762⤵
- Program crash
PID:392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "81ff24729e0f30bc4d82c78b4f004b36a3af841bdb8e8e8d98878ea7badded17.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 14002⤵
- Program crash
PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3624 -ip 36241⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3624 -ip 36241⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3624 -ip 36241⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3624 -ip 36241⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3624 -ip 36241⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3624 -ip 36241⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3624 -ip 36241⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3624 -ip 36241⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3624 -ip 36241⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3624 -ip 36241⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3624 -ip 36241⤵PID:3764