Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe
Resource
win10v2004-20240508-en
General
-
Target
0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe
-
Size
275KB
-
MD5
d38c3a0099b96cc45f6161a69bb4b211
-
SHA1
ca60da53a7c07577b8ef958dd33703bf7269be2f
-
SHA256
0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901
-
SHA512
efd0ee9d4d20e471965d45b8e4b2b9559762821af9d43cfcd5d84ad804a489974c53aafe2923e5f2395bdb5672148ac8e5db91cc443d33334fe9aedafa7cb84d
-
SSDEEP
6144:WfgQ8tj7sdkVcJhWnJjmNxK46muZV3qQGXa:h11Skq7ABmzKpFG
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4456 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 3776 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 2296 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 4408 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 5112 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 840 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 1584 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 1512 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 5108 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 2768 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe 4892 4904 WerFault.exe 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4300 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4300 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.execmd.exedescription pid process target process PID 4904 wrote to memory of 4136 4904 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe cmd.exe PID 4904 wrote to memory of 4136 4904 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe cmd.exe PID 4904 wrote to memory of 4136 4904 0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe cmd.exe PID 4136 wrote to memory of 4300 4136 cmd.exe taskkill.exe PID 4136 wrote to memory of 4300 4136 cmd.exe taskkill.exe PID 4136 wrote to memory of 4300 4136 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe"C:\Users\Admin\AppData\Local\Temp\0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 4602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 5042⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 7922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 8002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 8002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 4442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 9842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 10282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 13482⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "0dd249243c7c84d7cca7280a2b48a9e0b3a0869a0516aaffbe70556287a48901.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 13282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4904 -ip 49041⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4904-1-0x0000000002E50000-0x0000000002F50000-memory.dmpFilesize
1024KB
-
memory/4904-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/4904-2-0x0000000002E10000-0x0000000002E4C000-memory.dmpFilesize
240KB
-
memory/4904-7-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/4904-6-0x0000000000400000-0x0000000002CA3000-memory.dmpFilesize
40.6MB