Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe
Resource
win7-20240221-en
General
-
Target
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe
-
Size
277KB
-
MD5
39c9ac76013c43e4d824f46780853fef
-
SHA1
254741f6975cb20e98e212bb9c7b4c8c70bb9241
-
SHA256
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098
-
SHA512
ff3ab1f1c693aa1f11f6732292225bf00a5dacf89c73d58ba44c164d7443bf106a077ca74bc3816504a3896e343097194e9bdf65b367854e8d1a3b8d99fcb852
-
SSDEEP
3072:FuzgfDO5OQCAoDeJbB+OEll5+t5an/RJarFiBmqCx6lIylW0TTudOJ/vNU4O7ufO:jfD6CbqJlAz/Ragkhx6l44aIRNxvf
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4612 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 3224 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 4464 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 2380 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 1844 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 4936 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 1484 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 4560 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 4516 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 2364 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe 3252 220 WerFault.exe 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2368 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2368 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.execmd.exedescription pid process target process PID 220 wrote to memory of 3004 220 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe cmd.exe PID 220 wrote to memory of 3004 220 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe cmd.exe PID 220 wrote to memory of 3004 220 08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe cmd.exe PID 3004 wrote to memory of 2368 3004 cmd.exe taskkill.exe PID 3004 wrote to memory of 2368 3004 cmd.exe taskkill.exe PID 3004 wrote to memory of 2368 3004 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe"C:\Users\Admin\AppData\Local\Temp\08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 4562⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 5042⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 7562⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 7882⤵
- Program crash
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 7882⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 8002⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 9122⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 9882⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 10442⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 9762⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "08685f1c124422454dc52cad0d42b68109bd1c4d9c4f56ce67ed1959b4358098.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 13122⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 220 -ip 2201⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 220 -ip 2201⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 220 -ip 2201⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 220 -ip 2201⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 220 -ip 2201⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 220 -ip 2201⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 220 -ip 2201⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 220 -ip 2201⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 220 -ip 2201⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 220 -ip 2201⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 220 -ip 2201⤵PID:3016