Analysis
-
max time kernel
90s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-05-2024 23:53
Static task
static1
Behavioral task
behavioral1
Sample
7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe
Resource
win10v2004-20240508-en
General
-
Target
7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe
-
Size
365KB
-
MD5
88c14e3a5d4d441e17f8539f102fa7e2
-
SHA1
6d440bbc5524e7c199de9052ab3664aaef1907ad
-
SHA256
7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0
-
SHA512
3d2654c79007462e9fdc5dd248e334dbce1e2b1bfe2de40122f42e1897040a3f01eb388b6c55cdf6d3e783f65141364c994310c36883072de7c2bc71d75a6a90
-
SSDEEP
6144:WrNEzpupJ+y1YH6a0Wc6G99Sg7gvccmY9SlthHB:YNEzOJ+yoY1v9vgEJYO
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4224 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 4348 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 1832 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 4484 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 2116 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 3532 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 4076 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 4668 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe 2192 1876 WerFault.exe 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1296 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1296 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.execmd.exedescription pid process target process PID 1876 wrote to memory of 1352 1876 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe cmd.exe PID 1876 wrote to memory of 1352 1876 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe cmd.exe PID 1876 wrote to memory of 1352 1876 7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe cmd.exe PID 1352 wrote to memory of 1296 1352 cmd.exe taskkill.exe PID 1352 wrote to memory of 1296 1352 cmd.exe taskkill.exe PID 1352 wrote to memory of 1296 1352 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe"C:\Users\Admin\AppData\Local\Temp\7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 3642⤵
- Program crash
PID:4224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 7962⤵
- Program crash
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 8162⤵
- Program crash
PID:1832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 8362⤵
- Program crash
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 8442⤵
- Program crash
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 10002⤵
- Program crash
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 10882⤵
- Program crash
PID:4076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 14602⤵
- Program crash
PID:4668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "7bb90f2385d04eeb304c997fd98ff3450a166cb126be210dc62438e0c54d9ba0.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 4882⤵
- Program crash
PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1876 -ip 18761⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1876 -ip 18761⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 1876 -ip 18761⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1876 -ip 18761⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1876 -ip 18761⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1876 -ip 18761⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1876 -ip 18761⤵PID:332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1876 -ip 18761⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1876 -ip 18761⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1876-2-0x0000000002800000-0x000000000283C000-memory.dmpFilesize
240KB
-
memory/1876-1-0x00000000025C0000-0x00000000026C0000-memory.dmpFilesize
1024KB
-
memory/1876-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1876-8-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1876-7-0x0000000002800000-0x000000000283C000-memory.dmpFilesize
240KB
-
memory/1876-6-0x0000000000400000-0x0000000002378000-memory.dmpFilesize
31.5MB