Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-05-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe
Resource
win10v2004-20240508-en
General
-
Target
3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe
-
Size
276KB
-
MD5
2bc0a14889b50348187bb816a36725e8
-
SHA1
e7518022d51f9cca15a92a2f9bd4021773315a63
-
SHA256
3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1
-
SHA512
9551be263b6b3eb62e7392e78cb374b86ce56387dd1080e51335f5adcb2f1def26b7062ec61b33953df3e31672b59cc3fc8b257cb7aa8a5b5272d739670712a3
-
SSDEEP
3072:ZuGnnMlToA3ahjY3T+iMkS2lL7EMyTfqeVQph9+DwiCy+2+Pi/Y6HgltBhkONwwB:rnM9qJigg7E3LYb9Hi42qi/Alq8
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5012 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 5084 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 480 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 4076 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 1832 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 1908 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 952 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 2016 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 3444 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe 836 3024 WerFault.exe 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2052 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2052 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.execmd.exedescription pid process target process PID 3024 wrote to memory of 4260 3024 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe cmd.exe PID 3024 wrote to memory of 4260 3024 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe cmd.exe PID 3024 wrote to memory of 4260 3024 3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe cmd.exe PID 4260 wrote to memory of 2052 4260 cmd.exe taskkill.exe PID 4260 wrote to memory of 2052 4260 cmd.exe taskkill.exe PID 4260 wrote to memory of 2052 4260 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe"C:\Users\Admin\AppData\Local\Temp\3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 4762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 5162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 8642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 9842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 9922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 14442⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3abd54be7c96b8f42d6bec2a62d174de538a404a1dcc07cdd02e5035518c2de1.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 14562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3024 -ip 30241⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3024-2-0x00000000049C0000-0x00000000049FC000-memory.dmpFilesize
240KB
-
memory/3024-1-0x0000000002EE0000-0x0000000002FE0000-memory.dmpFilesize
1024KB
-
memory/3024-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3024-7-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3024-6-0x0000000000400000-0x0000000002CA3000-memory.dmpFilesize
40.6MB