Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe
Resource
win10v2004-20240508-en
General
-
Target
77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe
-
Size
277KB
-
MD5
9bad4b2e33b5f46cd55e649f44f27e90
-
SHA1
6cfe6ef810f28a4e562e9e36e53fe1dec1dde4e3
-
SHA256
77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388
-
SHA512
251c75fa82aff8902bf52581164a16cb9b9efaf2902eecca7a5b81b7d8d21560594b6e2c0bc272ef72d4a0b4b1bda069fb463dd1d7eaabd5704fa005d4682c89
-
SSDEEP
6144:xDh9q1Lk0EIqdME2iDpDNSbIEzHyd3hYPOw:xDh92Lk0t1ZQ0JbYw
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2748 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 4100 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 3052 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 3564 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 1872 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 3252 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 216 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 440 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 2364 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 4132 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe 1888 1976 WerFault.exe 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3968 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 3968 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.execmd.exedescription pid process target process PID 1976 wrote to memory of 4216 1976 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe cmd.exe PID 1976 wrote to memory of 4216 1976 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe cmd.exe PID 1976 wrote to memory of 4216 1976 77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe cmd.exe PID 4216 wrote to memory of 3968 4216 cmd.exe taskkill.exe PID 4216 wrote to memory of 3968 4216 cmd.exe taskkill.exe PID 4216 wrote to memory of 3968 4216 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe"C:\Users\Admin\AppData\Local\Temp\77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 4682⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 4642⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 7482⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 7682⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 8002⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 8482⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 8562⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 8522⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 10322⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 13442⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "77f5514a159e816442793a82897ef2e64a6fc4199fc8cc4d535494c1b9cad388.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 13722⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1976 -ip 19761⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1976 -ip 19761⤵PID:516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1976 -ip 19761⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1976 -ip 19761⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1976 -ip 19761⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1976 -ip 19761⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1976 -ip 19761⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1976 -ip 19761⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1976 -ip 19761⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1976 -ip 19761⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1976 -ip 19761⤵PID:4332