Analysis
-
max time kernel
106s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-05-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe
Resource
win10v2004-20240426-en
General
-
Target
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe
-
Size
234KB
-
MD5
10ce4f27695a42574059e5fd8b342760
-
SHA1
fc96ec057a00ccfa5491e40c01bafa1249da59e9
-
SHA256
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5
-
SHA512
0e32d8deb124ff86f37bffab0f9a052af6697764e5835938a98331661256a42ba16c702e360ca33980d799414fc5ac87ac62f547ff4d654e58f06e7b04d68b3a
-
SSDEEP
3072:De4EUm1rm8/JmSHWj3QFO0degWLz6a7w+MvC27uFlX5MvbX:1V4CSHYg4RMrClab
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2360 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 1692 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 1600 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 2032 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 1460 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 3964 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 1664 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe 3860 4540 WerFault.exe 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3084 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3084 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.execmd.exedescription pid process target process PID 4540 wrote to memory of 3720 4540 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe cmd.exe PID 4540 wrote to memory of 3720 4540 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe cmd.exe PID 4540 wrote to memory of 3720 4540 085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe cmd.exe PID 3720 wrote to memory of 3084 3720 cmd.exe taskkill.exe PID 3720 wrote to memory of 3084 3720 cmd.exe taskkill.exe PID 3720 wrote to memory of 3084 3720 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe"C:\Users\Admin\AppData\Local\Temp\085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 7722⤵
- Program crash
PID:2360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 7802⤵
- Program crash
PID:1692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 8282⤵
- Program crash
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 8362⤵
- Program crash
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10402⤵
- Program crash
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10802⤵
- Program crash
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 14202⤵
- Program crash
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "085ad204e85d66f16ed572a61b5319d90f6047f85da6a42f07eae5229f4c79f5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 15282⤵
- Program crash
PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4540 -ip 45401⤵PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4540 -ip 45401⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4540 -ip 45401⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4540 -ip 45401⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4540 -ip 45401⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4540 -ip 45401⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4540 -ip 45401⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4540 -ip 45401⤵PID:4152