Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe
Resource
win7-20240419-en
General
-
Target
d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe
-
Size
283KB
-
MD5
5b5ab97aee6adbebf8723ba2c8db59f5
-
SHA1
51d29bbf1aad66cfaba05e54c632cdc7f1e4c69c
-
SHA256
d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669
-
SHA512
52d756e62a8de9d312398e6fa2a7477b0097d3e5a5a976501ac6b828ed599ca2268d119df42b36469e4b8ae6ebadd039041339209fd288d9fd804044b8346f4c
-
SSDEEP
6144:A04BumjwNK22qDyOMsi5qL3/hRsUtPHWu2XaGtZT3Y:A04BumjauqGr8L7sUQrN
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3648 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 720 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 1048 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 3860 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 4884 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 2184 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 5068 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 1248 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 2900 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 2392 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe 1996 228 WerFault.exe d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1588 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1588 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.execmd.exedescription pid process target process PID 228 wrote to memory of 3524 228 d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe cmd.exe PID 228 wrote to memory of 3524 228 d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe cmd.exe PID 228 wrote to memory of 3524 228 d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe cmd.exe PID 3524 wrote to memory of 1588 3524 cmd.exe taskkill.exe PID 3524 wrote to memory of 1588 3524 cmd.exe taskkill.exe PID 3524 wrote to memory of 1588 3524 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe"C:\Users\Admin\AppData\Local\Temp\d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 4522⤵
- Program crash
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 4802⤵
- Program crash
PID:720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 7562⤵
- Program crash
PID:1048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 7642⤵
- Program crash
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 7802⤵
- Program crash
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 7882⤵
- Program crash
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 9122⤵
- Program crash
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 10042⤵
- Program crash
PID:1248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 10402⤵
- Program crash
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 13402⤵
- Program crash
PID:2392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "d22863dd9482836326de751c5a39a1d45f5237de7ccd1091a309c31edfb65669.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 12922⤵
- Program crash
PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 228 -ip 2281⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 228 -ip 2281⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 228 -ip 2281⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 228 -ip 2281⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 228 -ip 2281⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 228 -ip 2281⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 228 -ip 2281⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 228 -ip 2281⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 228 -ip 2281⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 228 -ip 2281⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 228 -ip 2281⤵PID:2192