Analysis
-
max time kernel
137s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe
Resource
win10v2004-20240426-en
General
-
Target
5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe
-
Size
293KB
-
MD5
ae42e88d1994524ba3bdcd883c130362
-
SHA1
d478a2f2971a4d42e3cea4a6f4bdc7cbb2a16511
-
SHA256
5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d
-
SHA512
210f9bdb167028ad0f2dd34d1b5f9be482f19c1fb5cc3da68aefdb0227f933229d88b0dd379a9e0fe5c60bb6f152d82556d0795381271e46ed36686a3d5c0aeb
-
SSDEEP
6144:wtjZMAM3J0OehQdYIjHhuaCqIqMNbokdT:GjZMfZ0OoQCIThuari
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1784 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 2392 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 4792 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 2284 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 440 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 1636 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 4760 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 1816 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 4628 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 3588 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe 2032 1388 WerFault.exe 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2964 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2964 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.execmd.exedescription pid process target process PID 1388 wrote to memory of 4432 1388 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe cmd.exe PID 1388 wrote to memory of 4432 1388 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe cmd.exe PID 1388 wrote to memory of 4432 1388 5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe cmd.exe PID 4432 wrote to memory of 2964 4432 cmd.exe taskkill.exe PID 4432 wrote to memory of 2964 4432 cmd.exe taskkill.exe PID 4432 wrote to memory of 2964 4432 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe"C:\Users\Admin\AppData\Local\Temp\5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 4522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 4802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 7482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 7842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 7842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 9122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 9162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 10402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 13482⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5ed8c8693a2dddb59cc3c6eacdc9ab604a9fd2c5d54a4d66f3231aadcd488d1d.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 14322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1388 -ip 13881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1388 -ip 13881⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1388-2-0x00000000048C0000-0x00000000048FC000-memory.dmpFilesize
240KB
-
memory/1388-1-0x0000000002E20000-0x0000000002F20000-memory.dmpFilesize
1024KB
-
memory/1388-3-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1388-8-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1388-7-0x00000000048C0000-0x00000000048FC000-memory.dmpFilesize
240KB
-
memory/1388-6-0x0000000000400000-0x0000000002CA8000-memory.dmpFilesize
40.7MB