Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe
Resource
win10v2004-20240508-en
General
-
Target
fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe
-
Size
288KB
-
MD5
a8b84d2fafd699d768923a36aafd60e3
-
SHA1
7dc17a01751deebeb7479afc9e0fdf7dcb99140a
-
SHA256
fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f
-
SHA512
91ad7677012309343650dfcbb08ac2bea7e0dace732d4cccd645cc7010204fb54e7a291e64272e247537def746722a641461698a7bc29c8bc8c3665c1a43c885
-
SSDEEP
6144:aXkp+Aj7tZEI2FWQ+JW34wdTn1EkYQHAr/Z40:mkp+AntZEI29wW1EkIq0
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3492 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 536 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 628 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 412 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 4584 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 4620 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 4220 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 1668 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 1432 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 1452 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe 5012 3056 WerFault.exe fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4644 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4644 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.execmd.exedescription pid process target process PID 3056 wrote to memory of 4304 3056 fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe cmd.exe PID 3056 wrote to memory of 4304 3056 fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe cmd.exe PID 3056 wrote to memory of 4304 3056 fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe cmd.exe PID 4304 wrote to memory of 4644 4304 cmd.exe taskkill.exe PID 4304 wrote to memory of 4644 4304 cmd.exe taskkill.exe PID 4304 wrote to memory of 4644 4304 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe"C:\Users\Admin\AppData\Local\Temp\fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 4562⤵
- Program crash
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 4802⤵
- Program crash
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 7482⤵
- Program crash
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 7882⤵
- Program crash
PID:412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 8082⤵
- Program crash
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 8482⤵
- Program crash
PID:4620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 9122⤵
- Program crash
PID:4220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 9882⤵
- Program crash
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 11642⤵
- Program crash
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 13522⤵
- Program crash
PID:1452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "fbd9a1d2f67e5cd2a0d29e36b1a6cdbf8f805334086fe436237a8e748067df9f.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 14442⤵
- Program crash
PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3056 -ip 30561⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3056 -ip 30561⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3056 -ip 30561⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3056 -ip 30561⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3056 -ip 30561⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3056 -ip 30561⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3056 -ip 30561⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3056 -ip 30561⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3056 -ip 30561⤵PID:4912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:81⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3056 -ip 30561⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3056 -ip 30561⤵PID:1992