Analysis
-
max time kernel
194s -
max time network
256s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-05-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe
Resource
win7-20240508-en
General
-
Target
7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe
-
Size
246KB
-
MD5
71bbbf7e1fa34c7f313db5ad0f016ac8
-
SHA1
5cf341395a8c9bfcb1a524357cc7efcacda850b0
-
SHA256
7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251
-
SHA512
55466b4854e1dd513726d60ba488d06b01e0f4e275f6cd761be4c753c8e3e217ca20f4dba768c8184bf70812b063d4ce2b6ed7fa04caa8c52620b5a78fe5cfbe
-
SSDEEP
3072:g85SOH34zX/rIvoyAUPMbksFhFDRGYGhnsnCQNZSNWWzEbmb5TwPq/:gGSZzI5A2Mb5FFAOnrZT5m5W
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 960 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe 2812 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe 3188 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe 648 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe 1592 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe 3168 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe 216 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe 644 4924 WerFault.exe 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3344 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3344 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.execmd.exedescription pid process target process PID 4924 wrote to memory of 1876 4924 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe cmd.exe PID 4924 wrote to memory of 1876 4924 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe cmd.exe PID 4924 wrote to memory of 1876 4924 7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe cmd.exe PID 1876 wrote to memory of 3344 1876 cmd.exe taskkill.exe PID 1876 wrote to memory of 3344 1876 cmd.exe taskkill.exe PID 1876 wrote to memory of 3344 1876 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe"C:\Users\Admin\AppData\Local\Temp\7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7602⤵
- Program crash
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7642⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8402⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9482⤵
- Program crash
PID:648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9682⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 10922⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 11242⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 12642⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "7d8f10814905a8a2c32827c1dadc78206d8568359c3a712ccdfc63db47dba251.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-