Analysis
-
max time kernel
89s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-05-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe
Resource
win10v2004-20240508-en
General
-
Target
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe
-
Size
267KB
-
MD5
0afa53d803373c11a881b62d87a1a94c
-
SHA1
d487534e1ac395a4733432952226e2f71fb44c48
-
SHA256
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5
-
SHA512
f5855758ea368d1a11d2e546b3e73086809232259a30aff51d68761da1a3bc8dcc62e9fa508a8b864f5a073a728c61406fcd163562944849f15aa12a579f4850
-
SSDEEP
6144:nDKYzzaDV6jRyLmgomqi3I08Q2ZvquhTWUrY:nnzOxgRbbmd49NZZ
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1796 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 1296 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 572 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 2956 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 2940 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 1416 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 4588 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 2924 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 3332 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe 4516 3168 WerFault.exe 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3080 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3080 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.execmd.exedescription pid process target process PID 3168 wrote to memory of 452 3168 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 3168 wrote to memory of 452 3168 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 3168 wrote to memory of 452 3168 9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe cmd.exe PID 452 wrote to memory of 3080 452 cmd.exe taskkill.exe PID 452 wrote to memory of 3080 452 cmd.exe taskkill.exe PID 452 wrote to memory of 3080 452 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe"C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 4802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 5002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 8002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 8002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 8522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 9762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 10922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 14442⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "9c65ea2cf49383876118b387d4a74106f7acf9e8c5527234a75e7d6714cefeb5.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 14002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3168 -ip 31681⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3168-1-0x0000000002E40000-0x0000000002F40000-memory.dmpFilesize
1024KB
-
memory/3168-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3168-2-0x00000000049B0000-0x00000000049EC000-memory.dmpFilesize
240KB
-
memory/3168-7-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3168-6-0x0000000000400000-0x0000000002CA1000-memory.dmpFilesize
40.6MB