Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe
Resource
win10v2004-20240226-en
General
-
Target
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe
-
Size
255KB
-
MD5
12068b3c709689a76e7432ded539ab7c
-
SHA1
579515827d3db8f7a6c7fda2a3d68274538d7179
-
SHA256
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a
-
SHA512
842b4b4adb51a8ba20748bd777cd413cb1f1254ae10f7f372b10374b6afe360e8e1eebf4ffccc524ba5b3d15280d2b408d6bb36f9b6a617c194784ac248697db
-
SSDEEP
6144:aehwWf8SYTepVWgv2YwRh9SDXgcj36+iMZ40:fhwWf8ApURVhiXgcb6Mq0
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2740 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 4728 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 4788 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 220 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 5112 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 1648 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 5068 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 4856 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe 4660 2148 WerFault.exe 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4740 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4740 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.execmd.exedescription pid process target process PID 2148 wrote to memory of 3568 2148 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe cmd.exe PID 2148 wrote to memory of 3568 2148 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe cmd.exe PID 2148 wrote to memory of 3568 2148 3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe cmd.exe PID 3568 wrote to memory of 4740 3568 cmd.exe taskkill.exe PID 3568 wrote to memory of 4740 3568 cmd.exe taskkill.exe PID 3568 wrote to memory of 4740 3568 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe"C:\Users\Admin\AppData\Local\Temp\3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 7402⤵
- Program crash
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 7602⤵
- Program crash
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 7602⤵
- Program crash
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 7402⤵
- Program crash
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 9042⤵
- Program crash
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 10002⤵
- Program crash
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 10322⤵
- Program crash
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 13562⤵
- Program crash
PID:4856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3153c3109e15bad00cb9d96580ab612fa553c6c15d248dddbffc3f6f7930639a.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 13242⤵
- Program crash
PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2148 -ip 21481⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2148 -ip 21481⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2148 -ip 21481⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2148 -ip 21481⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2148 -ip 21481⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2148 -ip 21481⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2148 -ip 21481⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2148 -ip 21481⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2148 -ip 21481⤵PID:2016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4832 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:1272