Analysis
-
max time kernel
137s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe
Resource
win10v2004-20240426-en
General
-
Target
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe
-
Size
234KB
-
MD5
10ce4f27695a42574059e5fd8b342760
-
SHA1
fc96ec057a00ccfa5491e40c01bafa1249da59e9
-
SHA256
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5
-
SHA512
0e32d8deb124ff86f37bffab0f9a052af6697764e5835938a98331661256a42ba16c702e360ca33980d799414fc5ac87ac62f547ff4d654e58f06e7b04d68b3a
-
SSDEEP
3072:De4EUm1rm8/JmSHWj3QFO0degWLz6a7w+MvC27uFlX5MvbX:1V4CSHYg4RMrClab
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 220 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 2896 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 228 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 652 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 4320 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 4088 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 2792 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 944 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 704 1224 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1416 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1416 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.execmd.exedescription pid process target process PID 1224 wrote to memory of 1688 1224 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe cmd.exe PID 1224 wrote to memory of 1688 1224 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe cmd.exe PID 1224 wrote to memory of 1688 1224 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe cmd.exe PID 1688 wrote to memory of 1416 1688 cmd.exe taskkill.exe PID 1688 wrote to memory of 1416 1688 cmd.exe taskkill.exe PID 1688 wrote to memory of 1416 1688 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe"C:\Users\Admin\AppData\Local\Temp\085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 7402⤵
- Program crash
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 7602⤵
- Program crash
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 7602⤵
- Program crash
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 8122⤵
- Program crash
PID:652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 9682⤵
- Program crash
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 9842⤵
- Program crash
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 10602⤵
- Program crash
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 13122⤵
- Program crash
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 14642⤵
- Program crash
PID:704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1224 -ip 12241⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1224 -ip 12241⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1224 -ip 12241⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1224 -ip 12241⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1224 -ip 12241⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1224 -ip 12241⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1224 -ip 12241⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1224 -ip 12241⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1224 -ip 12241⤵PID:2176