Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe
Resource
win10v2004-20240426-en
General
-
Target
625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe
-
Size
271KB
-
MD5
29a578e9ca5f23457a46957565033ed1
-
SHA1
045244ff6ab7488196eefbb98e80d7e3d08bcfab
-
SHA256
625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d
-
SHA512
8e4c1770383af78e41b44a1ae6e0821b74c27697d52115a7da07b110da48ea7d7689fdec3ca44fcfd236942d6b38e0873efab4f27bba717264ae99d0de666bb3
-
SSDEEP
3072:qszvEp6yhByoQ2g2Z6+ls2w4NVRQEQBB/p5VPcLJT/am0Az13luQrhRT8UeaFXOu:V3QYo89GgjxTUVr0Az11uARTFeaFhP7
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 548 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 2880 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 2988 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 1500 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 4552 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 408 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 1608 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 1692 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 2224 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 4744 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe 4728 4432 WerFault.exe 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4772 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4772 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.execmd.exedescription pid process target process PID 4432 wrote to memory of 1688 4432 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe cmd.exe PID 4432 wrote to memory of 1688 4432 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe cmd.exe PID 4432 wrote to memory of 1688 4432 625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe cmd.exe PID 1688 wrote to memory of 4772 1688 cmd.exe taskkill.exe PID 1688 wrote to memory of 4772 1688 cmd.exe taskkill.exe PID 1688 wrote to memory of 4772 1688 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe"C:\Users\Admin\AppData\Local\Temp\625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 4522⤵
- Program crash
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 4802⤵
- Program crash
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 7482⤵
- Program crash
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 7842⤵
- Program crash
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 7842⤵
- Program crash
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 7762⤵
- Program crash
PID:408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 7802⤵
- Program crash
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 9162⤵
- Program crash
PID:1692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 10282⤵
- Program crash
PID:2224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 13602⤵
- Program crash
PID:4744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "625f6d25ec7575ecdeba86082b63f829d149349fe460bfe39fa3c02b288a057d.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 13762⤵
- Program crash
PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4432 -ip 44321⤵PID:540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4432 -ip 44321⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4432 -ip 44321⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4432 -ip 44321⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4432 -ip 44321⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4432 -ip 44321⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4432 -ip 44321⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4432 -ip 44321⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4432 -ip 44321⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4432 -ip 44321⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4432 -ip 44321⤵PID:1372