Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe
Resource
win10v2004-20240508-en
General
-
Target
960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe
-
Size
267KB
-
MD5
9273df3941105736734b0290a252b913
-
SHA1
cd9e15bedf7268654c83cfc5abed0b64f2dbcbf8
-
SHA256
960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f
-
SHA512
a27d816ad9b7ec4ef2d5adb2be2abf585943687d0c9e8855e2dc9b4cab980d91b3b3c359e4d04140461144402a3008f559a292d2159007877a775ca3392aca21
-
SSDEEP
6144:zVK2RNslSdEjxtpsT0JBhzjO0uYrmxCx:s2ba//wUXO0F
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4192 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 1152 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 3484 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 3408 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 5044 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 4512 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 3000 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 4980 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 920 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe 3660 4088 WerFault.exe 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3988 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3988 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.execmd.exedescription pid process target process PID 4088 wrote to memory of 4636 4088 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe cmd.exe PID 4088 wrote to memory of 4636 4088 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe cmd.exe PID 4088 wrote to memory of 4636 4088 960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe cmd.exe PID 4636 wrote to memory of 3988 4636 cmd.exe taskkill.exe PID 4636 wrote to memory of 3988 4636 cmd.exe taskkill.exe PID 4636 wrote to memory of 3988 4636 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe"C:\Users\Admin\AppData\Local\Temp\960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 4522⤵
- Program crash
PID:4192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 7642⤵
- Program crash
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 8042⤵
- Program crash
PID:3484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 8042⤵
- Program crash
PID:3408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 8682⤵
- Program crash
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 9282⤵
- Program crash
PID:4512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 9322⤵
- Program crash
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 10482⤵
- Program crash
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 13682⤵
- Program crash
PID:920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "960c0bbb7fc3c013fe22b97f33f1d15189136350e25e05c67b9b0eb904ca1d8f.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 4922⤵
- Program crash
PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4088 -ip 40881⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4088 -ip 40881⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4088 -ip 40881⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4088 -ip 40881⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4088 -ip 40881⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4088 -ip 40881⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4088 -ip 40881⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4088 -ip 40881⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4088 -ip 40881⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4088 -ip 40881⤵PID:5008