Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe
Resource
win10v2004-20240226-en
General
-
Target
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe
-
Size
277KB
-
MD5
39c9ac76013c43e4d824f46780853fef
-
SHA1
254741f6975cb20e98e212bb9c7b4c8c70bb9241
-
SHA256
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098
-
SHA512
ff3ab1f1c693aa1f11f6732292225bf00a5dacf89c73d58ba44c164d7443bf106a077ca74bc3816504a3896e343097194e9bdf65b367854e8d1a3b8d99fcb852
-
SSDEEP
3072:FuzgfDO5OQCAoDeJbB+OEll5+t5an/RJarFiBmqCx6lIylW0TTudOJ/vNU4O7ufO:jfD6CbqJlAz/Ragkhx6l44aIRNxvf
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2904 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 3392 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 4084 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 1800 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 3256 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 5056 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 2200 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 2128 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 2920 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 3888 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 772 1600 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 416 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 416 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.execmd.exedescription pid process target process PID 1600 wrote to memory of 1004 1600 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe cmd.exe PID 1600 wrote to memory of 1004 1600 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe cmd.exe PID 1600 wrote to memory of 1004 1600 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe cmd.exe PID 1004 wrote to memory of 416 1004 cmd.exe taskkill.exe PID 1004 wrote to memory of 416 1004 cmd.exe taskkill.exe PID 1004 wrote to memory of 416 1004 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe"C:\Users\Admin\AppData\Local\Temp\08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 4682⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 5002⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 7482⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 7682⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 7922⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 8202⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 9122⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 10122⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 10482⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13522⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13242⤵
- Program crash
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1600 -ip 16001⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1600 -ip 16001⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1600 -ip 16001⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1600 -ip 16001⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1600 -ip 16001⤵PID:884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1600 -ip 16001⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1600 -ip 16001⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1600 -ip 16001⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1600 -ip 16001⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1600 -ip 16001⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1600 -ip 16001⤵PID:4204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:1280