Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe
Resource
win10v2004-20240508-en
General
-
Target
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe
-
Size
267KB
-
MD5
0afa53d803373c11a881b62d87a1a94c
-
SHA1
d487534e1ac395a4733432952226e2f71fb44c48
-
SHA256
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5
-
SHA512
f5855758ea368d1a11d2e546b3e73086809232259a30aff51d68761da1a3bc8dcc62e9fa508a8b864f5a073a728c61406fcd163562944849f15aa12a579f4850
-
SSDEEP
6144:nDKYzzaDV6jRyLmgomqi3I08Q2ZvquhTWUrY:nnzOxgRbbmd49NZZ
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3920 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 964 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 1964 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 4764 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 4596 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 5104 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 4892 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 2172 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 1264 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 1280 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 1964 3088 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4796 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4796 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.execmd.exedescription pid process target process PID 3088 wrote to memory of 1780 3088 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 3088 wrote to memory of 1780 3088 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 3088 wrote to memory of 1780 3088 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 1780 wrote to memory of 4796 1780 cmd.exe taskkill.exe PID 1780 wrote to memory of 4796 1780 cmd.exe taskkill.exe PID 1780 wrote to memory of 4796 1780 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe"C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 4562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 4842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 7482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 7482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 7482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 8882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 10002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 11282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 13562⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 13202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3088 -ip 30881⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4036,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3088 -ip 30881⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3088-1-0x0000000002EA0000-0x0000000002FA0000-memory.dmpFilesize
1024KB
-
memory/3088-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3088-2-0x0000000002E10000-0x0000000002E4C000-memory.dmpFilesize
240KB
-
memory/3088-8-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3088-7-0x0000000002E10000-0x0000000002E4C000-memory.dmpFilesize
240KB
-
memory/3088-6-0x0000000000400000-0x0000000002CA1000-memory.dmpFilesize
40.6MB